On the Security of an Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme
In 2009, Wang et al. proposed an efficient and secure dynamic ID-based remote user authentication scheme based on the one-way secure hash function. This letter demonstrates that Wang et al.'s scheme is still vulnerable to impersonation attacks.
Saved in:
Published in | IEICE Transactions on Information and Systems Vol. E95.D; no. 6; pp. 1684 - 1686 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English Japanese |
Published |
Oxford
The Institute of Electronics, Information and Communication Engineers
2012
Oxford University Press |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | In 2009, Wang et al. proposed an efficient and secure dynamic ID-based remote user authentication scheme based on the one-way secure hash function. This letter demonstrates that Wang et al.'s scheme is still vulnerable to impersonation attacks. |
---|---|
Bibliography: | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
ISSN: | 0916-8532 1745-1361 |
DOI: | 10.1587/transinf.E95.D.1684 |