Abstract
In this paper, we present a cryptanalysis of a timestamp-based password authentication scheme which is based on the concepts of ID-based schemes and smart cards. We show that the scheme is breakable. An intruder is able to construct forged login request from intercepted login requests and then he can impersonate other legal users and pass the system authentication.
| Original language | English |
|---|---|
| Pages (from-to) | 74-76 |
| Journal | Computers and Security |
| Volume | 21 |
| Issue number | 1 |
| DOIs | |
| Publication status | Published - 1998 |
Research Keywords
- Cryptanalysis
- ID-based scheme
- Password authentication
- Smart card