Cryptanalysis of Two Identification Schemes

Citation

Tan, Syh Yuan and Chin, Ji Jian and Behnia, Rouzbeh (2016) Cryptanalysis of Two Identification Schemes. In: 2015 2nd International Conference on Information Science and Security (ICISS). IEEE, pp. 1-4. ISBN 978-1-4673-8611-1

[img] Text
112.pdf
Restricted to Repository staff only

Download (111kB)

Abstract

Identification scheme is a cryptographic authentication protocol which allows a client to convince the corresponding server on the authenticity of his identity, without the need to share his secret with the server. In this paper, we cryptanalyze two identification schemes and show that they are not secure against impersonation under passive attack. We also propose a fix for one of the schemes to upgrade their security to secure against impersonation under passive, active and concurrent attacks.

Item Type: Book Section
Uncontrolled Keywords: Protocols, Servers, Elliptic curves, Elliptic curve cryptography
Subjects: Q Science > QA Mathematics > QA71-90 Instruments and machines > QA75.5-76.95 Electronic computers. Computer science
Divisions: Faculty of Engineering (FOE)
Faculty of Information Science and Technology (FIST)
Depositing User: Ms Rosnani Abd Wahab
Date Deposited: 30 Jan 2018 10:44
Last Modified: 30 Jan 2018 10:44
URII: http://shdl.mmu.edu.my/id/eprint/6661

Downloads

Downloads per month over past year

View ItemEdit (login required)