By Topic

Security Analysis of Authenticated Key Agreement Protocol Using Extended SVO Logic

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Zhimeng Liu ; Sch. of Comput. Sci. & Technol., Shandong Inst. of Bus. & Technol., Yantai, China

Some new notions and approaches are introduced to SVO logic, which make it capable of analyzing some authenticated key agreement protocols. A typical wireless authentication and key agreement protocol based on elliptic curve cryptography is analyzed by formal analysis methods. Some flaws have been found, which means that the protocol can not achieve the essential security requirements of security protocols, and a provably secure scheme which can resist the above attacks is proposed in the end.

Published in:

Multimedia Information Networking and Security, 2009. MINES '09. International Conference on  (Volume:2 )

Date of Conference:

18-20 Nov. 2009