Abstract

Recently Shim gave an attack on Harn's modified authenticated multiple-key agreement protocol. The authors point out Shim's attack is not workable. However, Harn's modified protocol is still insecure and the authors give another attack on it. Finally, the authors propose an efficient protocol that can prevent this attack.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call