Vulnerabilities in the Adachi-Aoki-Komano-Ohta micropayment scheme


Kim M., Koc C. K.

International Journal of Network Security, cilt.4, sa.2, ss.235-239, 2007 (Scopus) identifier

  • Yayın Türü: Makale / Tam Makale
  • Cilt numarası: 4 Sayı: 2
  • Basım Tarihi: 2007
  • Dergi Adı: International Journal of Network Security
  • Derginin Tarandığı İndeksler: Scopus
  • Sayfa Sayıları: ss.235-239
  • Anahtar Kelimeler: Electronic commerce, Impersonation, Micropayment, Payword, Replay attack
  • İstanbul Ticaret Üniversitesi Adresli: Evet

Özet

Rivest and Shamir presented two simple micropayment schemes, "PayWord" and "MicroMint," for making small purchases over the Internet [14]. Recently, Adachi et al. have pointed out that the PayWord scheme has two security problems, and proposed a new micropayment scheme to overcome these problems [1]. Nevertheless, we show that their protocol is still vulnerable to impersonation and replay attacks.