Abstract
We consider a recently described attack on a key establishment protocol contained in a draft international standard. Based on an observation as to why the attack is possible, we propose a simple modification to the protocol which avoids the attack.
Original language | British English |
---|---|
Pages (from-to) | 21-24 |
Number of pages | 4 |
Journal | Operating Systems Review (ACM) |
Volume | 32 |
Issue number | 4 |
DOIs | |
State | Published - Oct 1998 |