Paper 2024/683

A note on ``a new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE''

Zhengjun Cao
Lihua Liu
Abstract

We show the Seyhan-Akleylek key exchange protocol [J. Supercomput., 2023, 79:17859-17896] cannot resist offline dictionary attack and impersonation attack, not as claimed.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Key exchangemutual authenticationoffline dictionary attackimpersonation attack
Contact author(s)
liulh @ shmtu edu cn
History
2024-05-06: approved
2024-05-04: received
See all versions
Short URL
https://ia.cr/2024/683
License
No rights reserved
CC0

BibTeX

@misc{cryptoeprint:2024/683,
      author = {Zhengjun Cao and Lihua Liu},
      title = {A note on ``a new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE''},
      howpublished = {Cryptology ePrint Archive, Paper 2024/683},
      year = {2024},
      note = {\url{https://eprint.iacr.org/2024/683}},
      url = {https://eprint.iacr.org/2024/683}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.