Cryptanalysis of log-in authentication based on circle property

A scheme of user authentication had been proposed to authenticate users based on the secret data stored inside a smart card and the property of an n-dimensional circle. We investigate the security of the scheme and show that the scheme is insecure under the dictionary attack, the impersonation attac...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on consumer electronics Vol. 50; no. 2; pp. 625 - 628
Main Authors Yang, Fuw-Yi, Jan, Jinn-Ke
Format Journal Article
LanguageEnglish
Published New York IEEE 01.05.2004
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A scheme of user authentication had been proposed to authenticate users based on the secret data stored inside a smart card and the property of an n-dimensional circle. We investigate the security of the scheme and show that the scheme is insecure under the dictionary attack, the impersonation attack, and the attack of impersonating the central authority. Due to the insecurity under various attacks, we suggest that a cryptographic scheme should be provably secure.
Bibliography:ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
ISSN:0098-3063
1558-4127
DOI:10.1109/TCE.2004.1309440