2013 Third International Conference on Advanced Computing & Communication Technologies (ACCT 2013) (2013)
April 6, 2013 to April 7, 2013
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/ACCT.2013.58
Recently, Lee et. al. carried out the cryptanalysis of Juang et. al. two-factor authentication key exchange protocol in Public wireless LANs. It was shown that Juang et.al. protocol is vulnerable to the stolen verifier attack and doesn't satisfy the user anonymity. Apart from the, high computational overhead of the server. This paper, proposes an improved protocol towards authentication and key exchange based on Elliptic Curve Decision Diffie-Hellman(DDH) problem which ensures their strong resistance towards the existing weaknesses. Besides this, their security and performance analysis shows that the proposed protocol is more secure and efficient.
cryptographic protocols, message authentication, public key cryptography, wireless LAN
A. Singh and R. Rishi, "An Improved Two-Factor Authenticated Key Exchange Protocol in Public Wireless LANs," 2013 Third International Conference on Advanced Computing & Communication Technologies (ACCT 2013)(ACCT), Rohtak, 2013, pp. 226-230.