Dept. of Electr. Eng., National Taiwan Univ.Ku, Wei-ChiWei-ChiKuSHENG-DE WANG2007-04-192018-07-062007-04-192018-07-062000-1000135194http://ntur.lib.ntu.edu.tw//handle/246246/200704191001063Seo and Sweeney proposed a simple key agreement protocol which intended to act as a Diffie-Hellman scheme with user authentication. In the Seo and Sweeney protocol, two parties who have shared a common password can establish a session key by exchanging two messages. Tseng addressed a weakness in the key validation steps of the Seo-Sweeney protocol. The adversary can fool the honest party into believing a wrong session key. Tseng modified the key validation steps of the protocol and claimed that the key validation can be achieved in the modified protocol.application/pdf244431 bytesapplication/pdfen-USAlgorithms; Cryptography; Security of data; Cryptoanalysis; Key agreement protocol; Network protocolsCryptanalysis of modified authenticated key agreement protocoljournal article10.1049/el:200012692-s2.0-0034293729WOS:000090131400013http://ntur.lib.ntu.edu.tw/bitstream/246246/200704191001063/1/00878557.pdf