Abstract
In Public Wireless LANs(PWLANs), user anonymity is an essential issue. Recently, Juang et al. proposed an anonymous authentication and key exchange protocol using smart cards in PWLANs. They claimed that their proposed scheme provided identity privacy, mutual authentication, and half-forward secrecy. In this paper, we point out that Juang et al.'s protocol is vulnerable to the stolen-verifier attack and does not satisfy user anonymity.
Original language | English |
---|---|
Pages (from-to) | 194-197 |
Number of pages | 4 |
Journal | World Academy of Science, Engineering and Technology |
Volume | 59 |
Publication status | Published - 2009 Nov 1 |
Externally published | Yes |
Fingerprint
Keywords
- Authentication
- Key exchange
- Pwlans
- Smart card
- User privacy
ASJC Scopus subject areas
- Engineering(all)
Cite this
Cryptanalysis of two-factor authenticated key exchange protocol in public wireless LANs. / Lee, Hyunseung; Choi, Donghyun; Lee, Yunho; Won, Dongho; Kim, Seung-Joo.
In: World Academy of Science, Engineering and Technology, Vol. 59, 01.11.2009, p. 194-197.Research output: Contribution to journal › Article
}
TY - JOUR
T1 - Cryptanalysis of two-factor authenticated key exchange protocol in public wireless LANs
AU - Lee, Hyunseung
AU - Choi, Donghyun
AU - Lee, Yunho
AU - Won, Dongho
AU - Kim, Seung-Joo
PY - 2009/11/1
Y1 - 2009/11/1
N2 - In Public Wireless LANs(PWLANs), user anonymity is an essential issue. Recently, Juang et al. proposed an anonymous authentication and key exchange protocol using smart cards in PWLANs. They claimed that their proposed scheme provided identity privacy, mutual authentication, and half-forward secrecy. In this paper, we point out that Juang et al.'s protocol is vulnerable to the stolen-verifier attack and does not satisfy user anonymity.
AB - In Public Wireless LANs(PWLANs), user anonymity is an essential issue. Recently, Juang et al. proposed an anonymous authentication and key exchange protocol using smart cards in PWLANs. They claimed that their proposed scheme provided identity privacy, mutual authentication, and half-forward secrecy. In this paper, we point out that Juang et al.'s protocol is vulnerable to the stolen-verifier attack and does not satisfy user anonymity.
KW - Authentication
KW - Key exchange
KW - Pwlans
KW - Smart card
KW - User privacy
UR - http://www.scopus.com/inward/record.url?scp=78651557292&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78651557292&partnerID=8YFLogxK
M3 - Article
AN - SCOPUS:78651557292
VL - 59
SP - 194
EP - 197
JO - World Academy of Science, Engineering and Technology
JF - World Academy of Science, Engineering and Technology
SN - 2010-376X
ER -