Cryptanalysis and improvement of two access control schemes with user authentication in a distributed computer network

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

In 1998, Jan and Tseng proposed two integrated schemes of user authentication and access control which can be used to implement a protection system in distributed computer systems. This paper will analyze the security of both schemes and show that an intruder can easily forge a login, be accepted and logged in as a legal user, and access system resources. We will then propose a modified scheme to withstand our proposed attacks.

Original languageEnglish
Pages (from-to)386-391
Number of pages6
JournalIEICE Transactions on Information and Systems
VolumeE85-D
Issue number2
Publication statusPublished - 2002 Feb

All Science Journal Classification (ASJC) codes

  • Software
  • Hardware and Architecture
  • Computer Vision and Pattern Recognition
  • Electrical and Electronic Engineering
  • Artificial Intelligence

Fingerprint

Dive into the research topics of 'Cryptanalysis and improvement of two access control schemes with user authentication in a distributed computer network'. Together they form a unique fingerprint.

Cite this