Cryptanalysis of Zuhua Shao key Authentication Scheme
نویسندگان
چکیده
منابع مشابه
Cryptanalysis of LHL-key authentication scheme
It is proved that the LHL-key authentication scheme, proposed by Lee, Hwang and Li [Appl. Math. Comput. 139 (2003) 343], is insecure. The user s private key can be obtained easily from the user s public key certificate, hence compromising all the enciphered communications. In addition, the certificate validation process proposed in the same work is not a suitable one, as any certificate (valid ...
متن کاملComment: cryptanalysis of Lee-Hwang-Li's key authentication scheme
Key authentication is very important in secret communications and data security. Recently, Lee, Hwang and Li proposed a new public key authentication scheme for cryptosystems with a trusty server. However, in this paper, we will show that Lee-Hwang-Li’s key authentication scheme is not secure, from the obtained public information, any one can get the private key of the user. And then, we propos...
متن کاملCryptanalysis of a SIP Authentication Scheme
SIP (Session Initiation Protocol) is becoming the mostly deployed signaling protocol for VoIP (Voice over IP). Security is of utmost importance for its usage due to the open architecture of the Internet. Recently, Yoon et al. proposed a SIP authentication scheme based on elliptic curve cryptography (ECC) that claimed to provide higher security than other schemes. However, as demonstrated in thi...
متن کاملCryptanalysis of an Advanced Authentication Scheme
In this paper we study a scheme for making cryptanalysis and security improvement. This protocol by Song, is a password authentication protocol using smart card. We note that this protocol has been shown to be prone to the offline password guessing attack. We perform an additional cryptanalysis on this scheme and detect that it is vulnerable to the clogging attack, a type of denial-of-service a...
متن کاملCryptanalysis of Polynominal Authentication and Signature Scheme
Polynomial Authentication and Signature Scheme (PASS) is a new public key authentication and signature scheme proposed by NTRU Cryptosystems Inc. It is based on the hard problems related to constrained polynomial evaluation. In this paper, we break PASS with the proposed parameters. We show how to forge valid authentication transcripts or digital signatures in PASS with knowledge of the public ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2016
ISSN: 1877-0509
DOI: 10.1016/j.procs.2016.02.016