Back to Search
Start Over
Questioning Key Compromise Attack on Ostad-Sharif et al.’s Authentication and Session key Generation Scheme for Healthcare Applications
- Source :
- IEEE Access. 7:39717-39720
- Publication Year :
- 2019
- Publisher :
- Institute of Electrical and Electronics Engineers (IEEE), 2019.
-
Abstract
- Recently, Ostad-Sharif et al. pointed out the susceptibility of three different authentication schemes themed for telecare medicine/medical information systems to key compromise impersonation attack (KCIA). To further address this issue, they proposed an ECC-based authentication and key generation scheme for healthcare applications. In this paper, we show that Ostad-Sharif et al.'s scheme is not only affected with key compromise impersonation attack but also suffers from a key compromise password guessing attack. Several papers have been published by the researchers by applying KCIA on existing authentication protocols. Before any further move in research in this direction, researchers must contemplate about KCIA. We conclude this article with a rigorous analysis of KCIA along with two questions to ponderon for the research community working in this field.
- Subjects :
- Scheme (programming language)
Key generation
Authentication
General Computer Science
Computer science
Compromise
media_common.quotation_subject
General Engineering
Password cracking
020206 networking & telecommunications
02 engineering and technology
Computer security
computer.software_genre
Authentication protocol
0202 electrical engineering, electronic engineering, information engineering
Key (cryptography)
Session key
020201 artificial intelligence & image processing
General Materials Science
computer
media_common
computer.programming_language
Subjects
Details
- ISSN :
- 21693536
- Volume :
- 7
- Database :
- OpenAIRE
- Journal :
- IEEE Access
- Accession number :
- edsair.doi...........598596e14d25f05ac9bcd9820b63d123