Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications

  • Authors:
  • Cheng-Chi Lee;Tsung-Hung Lin;Chwei-Shyong Tsai

  • Affiliations:
  • Department of Library and Information Science, Fu Jen Catholic University, 510 Jhongjheng Road, New Taipei City, 24205, Taiwan and Department of Information and Communication Engineering, Asia Uni ...;Department of Computer Science and Information Engineering, National Chin-Yi University of Technology, 35, Lane 215, Section 1, Chung-Shan Road, Taiping City, TaichungTaiwan;Department of Management Information Systems, National Chung Hsing University, 250 Kuo Kuang Rd, Taichung, Taiwan

  • Venue:
  • Security and Communication Networks
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

To enhance the efficiency and the security in an anonymous channel of wireless systems, Yang et al. proposed a secure and efficient authentication protocol for an anonymous channel in wireless communications. The protocol did not use asymmetric cryptosystems to protect the identity of the mobile user because the cryptosystems have high complex and high computation cost. Not only can the protocol resist some security attacks but also the computation cost is low. However, the authors shall point out that their protocol is vulnerable to key compromise attack. Through this attack, any adversary can obtain the secret key Kh, i shared between the home network (HN) and the mobile station (MS). Then, the adversary can wiretap any messages that he/she wants using the secret key between the HN and the MS. Copyright © 2012 John Wiley & Sons, Ltd.