ACM Transactions on Computer Systems (TOCS)
Authentication and authenticated key exchanges
Designs, Codes and Cryptography
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Protocols for Authentication and Key Establishment
Protocols for Authentication and Key Establishment
Cryptanalysis to a remote user authentication scheme using smart cards for multi-server environment
HI'11 Proceedings of the 2011 international conference on Human interface and the management of information - Volume Part I
An authenticated key exchange to improve the security of Shi et al. and Kim et al.'s protocols
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
A novel protocol for downloadable CAS
IEEE Transactions on Consumer Electronics
Hi-index | 0.00 |
In 2008, Jeong et al. proposed a novel protocol for a downloadable conditional access system (DCAS). They claimed that their protocol provided mutual authentication and secure downloading of conditional access (CA) software. However we show that their protocol has a fatal weakness such that it is insecure to the impersonation attack. So, we propose the improved protocol based on their protocol. Moreover, we hope that by showing this design flaw, similar mistakes can be avoided in future designs.