Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Weaknesses in some recent key agreement protocols

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $31
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)

B. Arazi ( see ibid., vol. 29, no. 11, p. 966-7, 1993 ) recently proposed a way to integrate the DSS (digital signature standard) to the Diffie-Hellman key exchange system to obtain an authenticated key establishment mechanism for secret session keys. The authors point out the following weakness in the Arazi system: if one key is compromised then the others will be disclosed as well. A similar weakness appears also in another recently presented key distribution system

Published in:

Electronics Letters  (Volume:30 ,  Issue: 1 )