Cryptanalysis of log-in authentication based on circle property
A scheme of user authentication had been proposed to authenticate users based on the secret data stored inside a smart card and the property of an n-dimensional circle. We investigate the security of the scheme and show that the scheme is insecure under the dictionary attack, the impersonation attac...
Saved in:
Published in | IEEE transactions on consumer electronics Vol. 50; no. 2; pp. 625 - 628 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.05.2004
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | A scheme of user authentication had been proposed to authenticate users based on the secret data stored inside a smart card and the property of an n-dimensional circle. We investigate the security of the scheme and show that the scheme is insecure under the dictionary attack, the impersonation attack, and the attack of impersonating the central authority. Due to the insecurity under various attacks, we suggest that a cryptographic scheme should be provably secure. |
---|---|
Bibliography: | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
ISSN: | 0098-3063 1558-4127 |
DOI: | 10.1109/TCE.2004.1309440 |