International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 20 - Number 4 |
Year of Publication: 2011 |
Authors: R.Padmavathy |
10.5120/2421-3249 |
R.Padmavathy . Cryptanalysis of C-3 PEKE Protocol. International Journal of Computer Applications. 20, 4 ( April 2011), 22-31. DOI=10.5120/2421-3249
The key exchange protocol using passwords achieved great attention due to its simplicity and efficiency. Recently, Chang proposed a practical three-party key exchange (C-3 PEKE) protocol with round efficiency. Later, Lee and Chang presented an off-line password guessing attack on C-3 PEKE protocol. In the present paper, an impersonation-of-the initiator attack and impersonation-of-the responder attack are demonstrated on C-3 PEKE protocol using the off-line password guessing attack proposed by Lee and Chang.