A high-level mobile network interface with Security Protocols
Three-party encrypted key (3pek) exchange protocol plays associate obligatory role in space of the secure communication during which 2 users will agree a standard session key supported an occasional entropy watchword. In 2002, a watchword documented key exchange protocol supported RSA projected by Zhu et al.. Later, associate undetectable password-guessing attacks has shown by Yeh et al. on this theme and additionally has given solutions for improvement. Recently, Yangtze and Yangtze projected a unique 3 party easy key exchange protocol. Later, associate Undetectable on-line watchword shot attack has shown on the higher than protocol by Yoon and Yoo. Recently, a watchword key exchange protocol PSRJ was projected and additionally claimed to be in-vulnerable to Undetectable on-line watchword shot attack projected by Yoon and Yoo..A detectable on-line watchword shot attack has shown on this theme and has given solutions for improvement by Archana et al. in 2012.Later another version of the 3pek exchange protocol victimisation parallel message Trasmission Technique has been projected and claimed to be vulnerable.In this paper, we have a tendency to review this protocol and analyze its hardiness for security.
Rohit Gupta, Ravi Goyal