An attack on the Interlock Protocol when used for authentication.
Steven M. BellovinMichael MerrittPublished in: IEEE Trans. Inf. Theory (1994)
Keyphrases
- authentication protocol
- secret key
- session key
- key agreement
- key distribution
- authentication mechanism
- smart card
- security analysis
- mutual authentication
- key exchange protocol
- lightweight
- public key
- password authentication
- ban logic
- authentication scheme
- security protocols
- user authentication
- cryptographic protocols
- rfid systems
- diffie hellman
- key management
- elliptic curve
- virtual private network
- hash functions
- trusted third party
- key agreement protocol
- rfid tags
- formal analysis
- standard model
- secure communication
- security requirements
- multi party
- dos attacks
- digital signature