Title :
Cryptanalysis of Two Identification Schemes
Author :
Syh-Yuan Tan;Ji-Jian Chin;Rouzbeh Behnia
Author_Institution :
Fac. of Inf. Sci. &
Abstract :
Identification scheme is a cryptographic authentication protocol which allows a client to convince the corresponding server on the authenticity of his identity, without the need to share his secret with the server. In this paper, we cryptanalyze two identification schemes and show that they are not secure against impersonation under passive attack. We also propose a fix for one of the schemes to upgrade their security to secure against impersonation under passive, active and concurrent attacks.
Keywords :
"Protocols","Servers","Elliptic curves","Elliptic curve cryptography"
Conference_Titel :
Information Science and Security (ICISS), 2015 2nd International Conference on
DOI :
10.1109/ICISSEC.2015.7370991