Abstract

In 2004, Peinado pointed out that LHL-key authentication scheme is not secure as the intruder can obtain the private key of the users. For enhancing the security, Peinado proposed an improved LHL-key authentication scheme. However, in this paper, we will show that Peinado’s improved LHL-key authentication scheme is still vulnerable to public key substitution attack, i.e., an intruder can substitute a fake public key for the genuine one. And then, we propose a further improved LHL-key authentication scheme resistant to public key substitution attack.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call