﻿<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
	<front>
		<journal-meta>
			<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
			<journal-title-group>
				<journal-title>Informatica</journal-title>
			</journal-title-group>
			<issn pub-type="epub">1822-8844</issn>
			<issn pub-type="ppub">0868-4952</issn>
			<issn-l>0868-4952</issn-l>
			<publisher>
				<publisher-name>Vilnius University Institute of Mathematics and Informatics</publisher-name>
				<publisher-loc>Akademijos 4, LT-08663 Vilnius, Lithuania</publisher-loc>
			</publisher>
		</journal-meta>
		<article-meta>
			<article-id pub-id-type="publisher-id">INFO575</article-id>
			<article-id pub-id-type="doi">10.15388/Informatica.2005.082</article-id>
			<article-categories>
				<subj-group subj-group-type="heading">
					<subject>Research Article</subject>
				</subj-group>
			</article-categories>
			<title-group>
				<article-title>Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach</article-title>
			</title-group>
			<contrib-group>
				<contrib contrib-type="author">
					<name>
						<surname>Chang</surname>
						<given-names>Chin-Chen</given-names>
					</name>
					<email xlink:href="mailto:ccc@cs.ccu.edu.tw">ccc@cs.ccu.edu.tw</email>
					<xref ref-type="aff" rid="j_info575_aff_001">a</xref>
				</contrib>
				<contrib contrib-type="author">
					<name>
						<surname>Lin</surname>
						<given-names>Iuon-Chang</given-names>
					</name>
					<email xlink:href="mailto:iclin@cs.kuas.edu.tw">iclin@cs.kuas.edu.tw</email>
					<xref ref-type="aff" rid="j_info575_aff_002">b</xref>
				</contrib>
				<aff id="j_info575_aff_001">
					<label>a</label>Department of Computer Science and Information Engineering, <institution>National Chung Cheng University</institution>, 60, San-Hsing, Min-Hsiung, Chiayi 621, <country>Taiwan</country>
				</aff>
				<aff id="j_info575_aff_002">
					<label>b</label>Department of Management Information System, <institution>National Chung Hsing University</institution>, 250 Kuo Kuang Road, 402 Taichung, <country>Taiwan</country>
				</aff>
			</contrib-group>
			<pub-date pub-type="ppub">
				<year>2005</year>
			</pub-date>
			<volume>16</volume>
			<issue>1</issue>
			<fpage>37</fpage>
			<lpage>44</lpage>
			<history>
				<date date-type="received">
					<day>1</day>
					<month>11</month>
					<year>2001</year>
				</date>
			</history>
			<permissions>
				<copyright-statement>© 2005 Institute of Mathematics and Informatics, Vilnius</copyright-statement>
				<copyright-year>2005</copyright-year>
				<license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0/">
					<license-p>Open access article under the <ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/">CC BY</ext-link> license.</license-p>
				</license>
			</permissions>
			<abstract>
				<p>In 1995, Wu proposed a remote login authentication scheme based on geometric approach. However, Chien, Jan and Tseng presented a cryptanalysis of Wu’s scheme to show that it is not secure. Moreover, they proposed a modified version of Wu’s scheme. This paper presents there is a serious weakness in this modified remote login authentication scheme. We show that an illegal user can easily forge a valid login request in the modified version proposed previously.</p>
			</abstract>
			<kwd-group>
				<label>Key words</label>
				<kwd>cryptography</kwd>
				<kwd>remote login</kwd>
			</kwd-group>
		</article-meta>
	</front>
</article>