Login / Signup
An attack on the Interlock Protocol when used for authentication.
Steven M. Bellovin
Michael Merritt
Published in:
IEEE Trans. Inf. Theory (1994)
Keyphrases
</>
authentication protocol
secret key
session key
key agreement
key distribution
authentication mechanism
smart card
security analysis
mutual authentication
key exchange protocol
lightweight
public key
password authentication
ban logic
authentication scheme
security protocols
user authentication
cryptographic protocols
rfid systems
diffie hellman
key management
elliptic curve
virtual private network
hash functions
trusted third party
key agreement protocol
rfid tags
formal analysis
standard model
secure communication
security requirements
multi party
dos attacks
digital signature