Loading…

Cryptanalysis of a remote user authentication scheme using smart cards

We present a cryptanalysis of a remote user authentication scheme proposed by Hwang and Li (see ibid., vol.46, no.1, p.28-31, 2000). We show that Hwang-Li's scheme is breakable. A legitimate user can impersonate other legal users and pass the system authentication.

Saved in:
Bibliographic Details
Published in:IEEE transactions on consumer electronics 2000-11, Vol.46 (4), p.992-993
Main Authors: Chi-Kwong Chan, Cheng, L.M.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:We present a cryptanalysis of a remote user authentication scheme proposed by Hwang and Li (see ibid., vol.46, no.1, p.28-31, 2000). We show that Hwang-Li's scheme is breakable. A legitimate user can impersonate other legal users and pass the system authentication.
ISSN:0098-3063
1558-4127
DOI:10.1109/30.920451