List as follows:Firstly, the SAKA protocol is analysed, because the authentication codes of the two protocol participants completely lie on the long-term shared key, so it does not resist key-compromise impersonation.

  • 具体工作如下:首先,分析了SAKA协议,由于协议参与者双方的认证码完全依赖于长期共享密钥,因此它不具有密钥泄漏的安全性。
目录 查词历史