A Cryptanalysis to Lv et al.'s Scheme

Chao-Wen Chan, Shao-Fan Tseng, and Iuon-Chang Lin


Man-in-the-middle attack, Off-line attack, Oracle, Three-party key exchange


In the presented article, we cryptanalyze a three-party authenticated key exchange scheme proposed by Lv et al. in 2012. We propose two attacks to the scheme. One is an off-line attack and another is a man-in-the-middle attack. We also analyze these two attacks in the article.

Important Links:

Go Back