首页
社区
课程
招聘
[分享][分享+讨论]对 XOR_password 及XOR_cryptanalyiss 等相关论文研讨。(No. 3)
发表于: 2009-11-22 22:48 4694

[分享][分享+讨论]对 XOR_password 及XOR_cryptanalyiss 等相关论文研讨。(No. 3)

2009-11-22 22:48
4694
History:
This artilce extended from :

1) 分享+讨论】对 XOR_password 及XOR_cryptanalyiss 等相关论文研讨。(No. 1)
and
2) 【分享+讨论】对 XOR_password 及XOR_cryptanalyiss 等相关论文研讨。(No. 2)

Original thinking from:
1) 【原创】The XOR Secret in Our Computer System

2) 【原创】The XOR Secret in Our Computer System--延伸討論

Here, I would like to continue about xor issue for other paper.
Wong and Chan proposed a ‘Mutual authentication and key exchange for low power wireless communications', then Kyungah Shim firstly presented a cryptanalysis (Cryptanalysis of mutual authentication and key exchange for low power wireless communications.pdf ). Later, Siaw-Lynn Ng and Chris Mitchell also gave a comment (Comments on mutual authentication and key exchange protocols for low power wireless.pdf). The other one scholar pointed out a verity attack (On the security of mutual authentication and key exchange for low power wireless communications.pdf).
According to our discussion last time, our method may be easily, directly, and more efficiently to success attack.


σ= rA ⊕ y.
Thus, we can make a new one where σ= (-rA ⊕ -y).


This is a original equation in Wong-Chan scheme.

According our method, we can rewrite to the other one, and obtain the same result.

So, we make it now.

[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课

上传的附件:
收藏
免费 0
支持
分享
最新回复 (3)
雪    币: 201
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
jxm
2
下载看看,支持一下rock。
2010-5-10 11:02
0
雪    币: 232
活跃值: (10)
能力值: ( LV4,RANK:50 )
在线值:
发帖
回帖
粉丝
3
关注下,看看能否实际应用到里面去
2010-5-11 09:01
0
雪    币: 201
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
jxm
4
是不是要設計一種新的認證機制啊?
2010-5-11 20:40
0
游客
登录 | 注册 方可回帖
返回
//