Journal
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS
Volume 46, Issue 4, Pages 992-993Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/30.920451
Keywords
cryptography; cryptanalysis; password authentication; remote login
Ask authors/readers for more resources
In this paper, we present a cryptanalysis of a remote user authentication scheme proposed by Hwang and Li. We show that Hwang-Li's scheme is breakable. A legitimate user can impersonate other legal users and pass the system authentication.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available