首页
社区
课程
招聘
[分享][分享+讨论]对 XOR_password 及XOR_cryptanalyiss 等相关论文研讨。(No. 3)
发表于: 2009-11-22 22:48 4695

[分享][分享+讨论]对 XOR_password 及XOR_cryptanalyiss 等相关论文研讨。(No. 3)

2009-11-22 22:48
4695
History:
This artilce extended from :

1) 分享+讨论】对 XOR_password 及XOR_cryptanalyiss 等相关论文研讨。(No. 1)
and
2) 【分享+讨论】对 XOR_password 及XOR_cryptanalyiss 等相关论文研讨。(No. 2)

Original thinking from:
1) 【原创】The XOR Secret in Our Computer System

2) 【原创】The XOR Secret in Our Computer System--延伸討論

Here, I would like to continue about xor issue for other paper.
Wong and Chan proposed a ‘Mutual authentication and key exchange for low power wireless communications', then Kyungah Shim firstly presented a cryptanalysis (Cryptanalysis of mutual authentication and key exchange for low power wireless communications.pdf ). Later, Siaw-Lynn Ng and Chris Mitchell also gave a comment (Comments on mutual authentication and key exchange protocols for low power wireless.pdf). The other one scholar pointed out a verity attack (On the security of mutual authentication and key exchange for low power wireless communications.pdf).
According to our discussion last time, our method may be easily, directly, and more efficiently to success attack.


σ= rA ⊕ y.
Thus, we can make a new one where σ= (-rA ⊕ -y).


This is a original equation in Wong-Chan scheme.

According our method, we can rewrite to the other one, and obtain the same result.

So, we make it now.

[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)

上传的附件:
收藏
免费 0
支持
分享
最新回复 (3)
雪    币: 201
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
jxm
2
下载看看,支持一下rock。
2010-5-10 11:02
0
雪    币: 232
活跃值: (10)
能力值: ( LV4,RANK:50 )
在线值:
发帖
回帖
粉丝
3
关注下,看看能否实际应用到里面去
2010-5-11 09:01
0
雪    币: 201
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
jxm
4
是不是要設計一種新的認證機制啊?
2010-5-11 20:40
0
游客
登录 | 注册 方可回帖
返回
//