Abstract
Owing to the rapid development of microelectronics techniques, the computation power of low-cost processors has increased greatly. Therefore, based on a public-key and secret-key hybrid algorithm, Zhibin and Naitong proposed an authentication scheme for personal communication systems; they emphasised security of mutual authentication, and claimed to provide non-repudiation of service. However, it is shown here that an attacker can easily impersonate a valid network provider, therefore non-repudiation of service is not provided by the aforementioned scheme.
Original language | English |
---|---|
Pages (from-to) | 895-896 |
Number of pages | 2 |
Journal | Electronics Letters |
Volume | 37 |
Issue number | 14 |
DOIs | |
Publication status | Published - 2001 Jul 5 |
All Science Journal Classification (ASJC) codes
- Electrical and Electronic Engineering