Research note: Cryptanalysis of Lee and Chang's ID-based information security functions

  • Authors:
  • W. -H. He;T. -C. Wu

  • Affiliations:
  • Department of Information Management, National Taiwan University of Science and Technology, 43, Section 4, Keelung Road, Taipei 106, Taiwan;Department of Information Management, National Taiwan University of Science and Technology, 43, Section 4, Keelung Road, Taipei 106, Taiwan

  • Venue:
  • Computer Communications
  • Year:
  • 1999

Quantified Score

Hi-index 0.24

Visualization

Abstract

Recently, Lee and Chang proposed three ID-based information security functions that can be applied to the design of two authenticated key distribution schemes as well as three digital signature schemes (see Computer Communications 20 (14) (1997) 1301). They also claimed that security analyses of the proposed schemes are based on the difficulty of solving factorization, discrete logarithms modulo a composite, and the Diffie-Hellman problem. The authors will demonstrate several attacks on Lee and Chang's schemes, and show that all these schemes cannot fulfil the claimed security requirements.