Full metadata record
DC FieldValueLanguage
dc.contributor.authorTzeng, WGen_US
dc.contributor.authorHu, CMen_US
dc.date.accessioned2014-12-08T15:46:45Z-
dc.date.available2014-12-08T15:46:45Z-
dc.date.issued1999-03-26en_US
dc.identifier.issn0020-0190en_US
dc.identifier.urihttp://dx.doi.org/10.1016/S0020-0190(99)00023-Xen_US
dc.identifier.urihttp://hdl.handle.net/11536/31445-
dc.description.abstractWe present a new attack, called the inter-protocol interleaving attack, on authentication and key distribution protocols. The attack enlightens us two things. The first is that when considering attacks against a protocol, we should consider not only the protocol itself, but also the interaction with other protocols. The second is about a warning of "not using the shared secret keys between a server and its clients in any other places" that appears in many security-related communication standards, such as CCITT X.509 and ISO 9798. Our attack provides a concrete example for showing that this warning is necessary. (C) 1999 Elsevier Science B.V. All rights reserved.en_US
dc.language.isoen_USen_US
dc.subjectcryptographic attacken_US
dc.subjectinter-protocol interleaving attacken_US
dc.subjectauthenticationen_US
dc.subjectkey distributionen_US
dc.titleInter-protocol interleaving attacks on some authentication and key distribution protocolsen_US
dc.typeArticleen_US
dc.identifier.doi10.1016/S0020-0190(99)00023-Xen_US
dc.identifier.journalINFORMATION PROCESSING LETTERSen_US
dc.citation.volume69en_US
dc.citation.issue6en_US
dc.citation.spage297en_US
dc.citation.epage302en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000080038900006-
dc.citation.woscount9-
Appears in Collections:Articles


Files in This Item:

  1. 000080038900006.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.