After reviewing these protocols, it is proved that these protocols still suffer from the password guessing attack, and the attacker against the E-SAKA protocol can get the session key.
通过分析发现E - SAKA协议及其改进算法仍然会受到密钥猜测攻击,并且E - SAKA协议中攻击者能获得会话密钥。
After reviewing these protocols, it is proved that these protocols still suffer from the password guessing attack, and the attacker against the E-SAKA protocol can get the session key.
通过分析发现E - SAKA协议及其改进算法仍然会受到密钥猜测攻击,并且E - SAKA协议中攻击者能获得会话密钥。
应用推荐