Weakness. We show that the ▇▇▇▇-▇▇▇▇▇’▇ scheme is not secure against the unknown key sharing and the impersonation attacks as follows.
Appears in 2 contracts
Sources: Authenticated Key Agreement Scheme, Authenticated Key Agreement Scheme
Weakness. We show that the ▇▇▇▇-▇▇▇▇▇’▇ scheme is not secure against the unknown key sharing and the impersonation attacks as follows.
Appears in 2 contracts
Sources: Authenticated Key Agreement Scheme, Authenticated Key Agreement Scheme