Cryptanalysis of the user authentication scheme with anonymity

  • Authors:
  • Woongryul Jeon;Jeeyeon Kim;Junghyun Nam;Youngsook Lee;Dongho Won

  • Affiliations:
  • School of Information and Communication Engineering, Sungkyunkwan University, Suwon-si, Gyeonggi-do, Korea;School of Information and Communication Engineering, Sungkyunkwan University, Suwon-si, Gyeonggi-do, Korea;Department of Computer Engineering, Konkuk University, Chungju-si, Chungcheongbuk-do, Korea;Department of Cyber Investigation Police, Howon University, Gunsan-si, Jeonrabuk-do, Korea;School of Information and Communication Engineering, Sungkyunkwan University, Suwon-si, Gyeonggi-do, Korea

  • Venue:
  • FGIT'11 Proceedings of the Third international conference on Future Generation Information Technology
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Nowadays, wireless communications using mobile device are growing rapidly. The most advantage of wireless communication is that user can transfer various information to anywhere at anytime using mobile device. However, it is clear that security of the wireless communications is more complex than wired owing to the openness of the wireless network. Thus, authentication has become the most important issue in the wireless communication. Furthermore, owing to the fact that location information shows user's life style, user anonymity becomes also significant issue. Recently, in 2011, Kang et al. pointed out that Wu et al.'s scheme has some security vulnerabilities and proposed an improved scheme. However, in this paper, we discuss that Kang et al.'s scheme is still vulnerable to active adversary.