Abstract
Owing to the rapid development of microelectronics techniques, the computation power of low-cost processors has increased greatly. Therefore, based on a public-key and secret-key hybrid algorithm, Zhibin and Naitong proposed an authentication scheme for personal communication systems; they emphasised security of mutual authentication, and claimed to provide non-repudiation of service. However, it is shown here that an attacker can easily impersonate a valid network provider, therefore non-repudiation of service is not provided by the aforementioned scheme.
Original language | English |
---|---|
Pages (from-to) | 895-896 |
Number of pages | 2 |
Journal | Electronics Letters |
Volume | 37 |
Issue number | 14 |
DOIs | |
Publication status | Published - 2001 Jul 5 |
Fingerprint
All Science Journal Classification (ASJC) codes
- Electrical and Electronic Engineering
Cite this
}
Cryptanalysis on dynamic authentication protocol for personal communication system. / Chien, Hung Yu; Chen, Yi Hwa; Jan, Jinn Ke; Tseng, Yuh Min.
In: Electronics Letters, Vol. 37, No. 14, 05.07.2001, p. 895-896.Research output: Contribution to journal › Article
TY - JOUR
T1 - Cryptanalysis on dynamic authentication protocol for personal communication system
AU - Chien, Hung Yu
AU - Chen, Yi Hwa
AU - Jan, Jinn Ke
AU - Tseng, Yuh Min
PY - 2001/7/5
Y1 - 2001/7/5
N2 - Owing to the rapid development of microelectronics techniques, the computation power of low-cost processors has increased greatly. Therefore, based on a public-key and secret-key hybrid algorithm, Zhibin and Naitong proposed an authentication scheme for personal communication systems; they emphasised security of mutual authentication, and claimed to provide non-repudiation of service. However, it is shown here that an attacker can easily impersonate a valid network provider, therefore non-repudiation of service is not provided by the aforementioned scheme.
AB - Owing to the rapid development of microelectronics techniques, the computation power of low-cost processors has increased greatly. Therefore, based on a public-key and secret-key hybrid algorithm, Zhibin and Naitong proposed an authentication scheme for personal communication systems; they emphasised security of mutual authentication, and claimed to provide non-repudiation of service. However, it is shown here that an attacker can easily impersonate a valid network provider, therefore non-repudiation of service is not provided by the aforementioned scheme.
UR - http://www.scopus.com/inward/record.url?scp=0035811783&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=0035811783&partnerID=8YFLogxK
U2 - 10.1049/el:20010607
DO - 10.1049/el:20010607
M3 - Article
AN - SCOPUS:0035811783
VL - 37
SP - 895
EP - 896
JO - Electronics Letters
JF - Electronics Letters
SN - 0013-5194
IS - 14
ER -