Cryptanalysis of an authentication protocol

被引:0
|
作者
Groza, B [1 ]
Petrica, D [1 ]
机构
[1] Politehn Univ Timisoara, Automat & Appl Informat Dept, Timisoara, Romania
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Authentication protocols have applications in many fields. The security of authentication protocols is commonly based on cryptographic primitives. Constructing secure authentication protocols is not an easy challenge and there is a large number of authentication protocols that prove to be insecure. Wulf et al. have proposed in [1] a protocol by which an entity can authenticate in a distributed system environment without using any shared secret. This paper will make a brief analysis of the proposed protocol and will show how it can be broken. The protocol will be broken by using multiplicative inverses of the integers from Z(n), where n is a prime number.
引用
收藏
页码:147 / 153
页数:7
相关论文
共 50 条
  • [1] Cryptanalysis of a Multifactor Authentication Protocol
    Likitha, Soorea
    Saravanan, R.
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1, 2019, 707 : 35 - 42
  • [2] Cryptanalysis of a User Authentication Protocol
    Tan, Zuowen
    2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 27 - 30
  • [3] Cryptanalysis of the LCSS RFID Authentication Protocol
    Cao, Tianjie
    Shen, Peng
    Bertino, Elisa
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 305 - +
  • [4] Recursive Cryptanalysis of the IoT Authentication Protocol
    Najam-ul-Islam, Muhammad
    Khalid, Madiha
    Park, Hyesung
    Khokhar, Umar
    2019 IEEE 1ST GLOBAL POWER, ENERGY AND COMMUNICATION CONFERENCE (GPECOM2019), 2019, : 1 - 4
  • [5] Cryptanalysis of the shifted conjugacy authentication protocol
    Longrigg, Jonathan
    Ushakov, Alexander
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2008, 2 (02) : 109 - 116
  • [6] Cryptanalysis of an authentication and key distribution protocol
    Tamkang Univ, Taipei, Taiwan
    Commun Lett, 1 (7-8):
  • [7] Cryptanalysis of an authentication and key distribution protocol
    Yen, SM
    IEEE COMMUNICATIONS LETTERS, 1999, 3 (01) : 7 - 8
  • [8] Cryptanalysis and improvement of a group RFID authentication protocol
    Nasrollah Pakniat
    Ziba Eslami
    Wireless Networks, 2020, 26 : 3363 - 3372
  • [9] Cryptanalysis and Improvement of Robust Deniable Authentication Protocol
    Fagen Li
    Tsuyoshi Takagi
    Wireless Personal Communications, 2013, 69 : 1391 - 1398
  • [10] Cryptanalysis and Improvement of Robust Deniable Authentication Protocol
    Li, Fagen
    Takagi, Tsuyoshi
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 69 (04) : 1391 - 1398