Cryptanalysis of an optimized protocol for mobile network authentication and security

C. S. Laih, S. Y. Chiou*

*Corresponding author for this work

Research output: Contribution to journalJournal Article peer-review

3 Scopus citations

Abstract

Yi et al. presented a protocol for mobile network authentication and key distribution based upon the DSA signature scheme. The protocol can be divided into two phases, i.e., registration phase and service phase. In this paper, we show that their scheme is insecure on the registration phase since an attacker can easily forge a certification for any exit or dummy user in their protocol and then pretend to be a legal user to communicate with other entities.

Original languageEnglish
Pages (from-to)339-341
Number of pages3
JournalInformation Processing Letters
Volume85
Issue number6
DOIs
StatePublished - 31 03 2003
Externally publishedYes

Keywords

  • Certification
  • Cryptanalysis
  • Cryptography
  • Mobile network authentication

Fingerprint

Dive into the research topics of 'Cryptanalysis of an optimized protocol for mobile network authentication and security'. Together they form a unique fingerprint.

Cite this