Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
9506782 | Applied Mathematics and Computation | 2005 | 7 Pages |
Abstract
In 2004, Peinado pointed out that LHL-key authentication scheme is not secure as the intruder can obtain the private key of the users. For enhancing the security, Peinado proposed an improved LHL-key authentication scheme. However, in this paper, we will show that Peinado's improved LHL-key authentication scheme is still vulnerable to public key substitution attack, i.e., an intruder can substitute a fake public key for the genuine one. And then, we propose a further improved LHL-key authentication scheme resistant to public key substitution attack.
Keywords
Related Topics
Physical Sciences and Engineering
Mathematics
Applied Mathematics
Authors
Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo,