Citation
Tan, Syh Yuan and Chin, Ji Jian and Behnia, Rouzbeh (2016) Cryptanalysis of Two Identification Schemes. In: 2015 2nd International Conference on Information Science and Security (ICISS). IEEE, pp. 1-4. ISBN 978-1-4673-8611-1
Text
112.pdf Restricted to Repository staff only Download (111kB) |
Official URL: http://doi.org/10.1109/ICISSEC.2015.7370991
Abstract
Identification scheme is a cryptographic authentication protocol which allows a client to convince the corresponding server on the authenticity of his identity, without the need to share his secret with the server. In this paper, we cryptanalyze two identification schemes and show that they are not secure against impersonation under passive attack. We also propose a fix for one of the schemes to upgrade their security to secure against impersonation under passive, active and concurrent attacks.
Item Type: | Book Section |
---|---|
Uncontrolled Keywords: | Protocols, Servers, Elliptic curves, Elliptic curve cryptography |
Subjects: | Q Science > QA Mathematics > QA71-90 Instruments and machines > QA75.5-76.95 Electronic computers. Computer science |
Divisions: | Faculty of Engineering (FOE) Faculty of Information Science and Technology (FIST) |
Depositing User: | Ms Rosnani Abd Wahab |
Date Deposited: | 30 Jan 2018 10:44 |
Last Modified: | 30 Jan 2018 10:44 |
URII: | http://shdl.mmu.edu.my/id/eprint/6661 |
Downloads
Downloads per month over past year
Edit (login required) |