Flaws in an e-mail protocol of Sun, Hsieh, and Hwang

نویسنده

  • Alexander W. Dent
چکیده

Recently, Sun, Hseih and Hwang [1] proposed two methods of retrieving e-mail from a central e-mail server and claimed that these algorithms had perfect forward secrecy. We present a critique of one of their algorithms. In particular, we break the forward secrecy of the second proposed protocol.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Security of Some Password Authentication Protocols

In an internet environment, such as UNIX, a remote user has to obtain the access right from a server before doing any job. The procedure of obtaining acess right is called a user authentication protocol. User authentication via user memorable password provides convenience without needing any auxiliary devices, such as smart card. A user authentication protocol via username and password should b...

متن کامل

The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols

Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols, many protocol designers fail to provide any proof of security. Flaws detected long after the publication and/or implementation of protocols will erode the credibility of key establishment protocols. We revisit recent work of Choo, Boyd, Hitchcock, & Maitland (2004) wh...

متن کامل

Formal analysis of Jan–Chen, Yang–Shen–Shieh, Kim–Huh–Hwang– Lee, Lin–Sun–Hwang, and Yeh–Sun protocols

Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols, many protocol designers fail to provide any proof of security. Flaws detected long after the publication and/or implementation of protocols will erode the credibility of key establishment protocols. We revisit recent work of Choo, Boyd, Hitchcock, Maitland where they ...

متن کامل

Adaptive Transaction Management Protocols for Mobile Client Caching DBMSs

ILYOUNG CHUNG, LE GRUENWALD, CHONG-SUN HWANG AND SOON YOUNG JUNG Department of Computer Science Purdue University West Lafayette, IN 47097, U.S.A. E-mail: [email protected] School of Computer Science University of Oklahoma E-mail: [email protected] Department of Computer Science and Engineering Korea University SeongBuk-Gu, Seoul 136-701, Korea E-mail: [email protected] Department of ...

متن کامل

Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

In recent years, routing has been the most focused area in ad hoc networks research. On-demand routing in particular, is widely developed in bandwidth constrained mobile wireless ad hoc networks because of its effectiveness and efficiency. Most proposed on-demand routing protocols are built and relied on single route for each data session. Whenever there is a link disconnection on the active ro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Communications Letters

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2005