Paper 2024/683
A note on ``a new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE''
Abstract
We show the Seyhan-Akleylek key exchange protocol [J. Supercomput., 2023, 79:17859-17896] cannot resist offline dictionary attack and impersonation attack, not as claimed.
Metadata
- Available format(s)
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- Key exchangemutual authenticationoffline dictionary attackimpersonation attack
- Contact author(s)
- liulh @ shmtu edu cn
- History
- 2024-05-06: approved
- 2024-05-04: received
- See all versions
- Short URL
- https://ia.cr/2024/683
- License
-
CC0
BibTeX
@misc{cryptoeprint:2024/683, author = {Zhengjun Cao and Lihua Liu}, title = {A note on ``a new password-authenticated module learning with rounding-based key exchange protocol: Saber.{PAKE}''}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/683}, year = {2024}, url = {https://eprint.iacr.org/2024/683} }