Cryptanalysis of a key authentication scheme based on the chinese remainder theorem and discrete logarithms

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In 2015, Kumaraswamy et al. have proposed an improvement of the key authentication scheme based on discrete logarithms. That kind of schemes has been widely studied for many years, producing many modifications and improvements designed to overcome the weaknesses detected; most of them leading to key substitution attacks and, in some cases, allowing to recover the user’s private key. The improvement proposed by Kumaraswamy et al. is based on the Chinese remainder theorem in combination with the discrete logarithm. In this paper, several mathematical inconsistencies are revealed in the definition. Once fixed, a key substitution attack is performed.

Cite

CITATION STYLE

APA

Peinado, A. (2017). Cryptanalysis of a key authentication scheme based on the chinese remainder theorem and discrete logarithms. In Advances in Intelligent Systems and Computing (Vol. 527, pp. 631–637). Springer Verlag. https://doi.org/10.1007/978-3-319-47364-2_61

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free