Cryptology ePrint Archive: Report 2011/062

Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Two-Party Communication

Swapnoneel Roy and Amlan K Das and Yu Li

Abstract: In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart cards. We note that this scheme has already been shown vulnerable to the off-line password guessing attack by Tapiador et al. We perform a further cryptanalysis on this protocol and observe that it is prone to the clogging attack, a kind of denial of service (DOS) attack. We observe that all smart card based authentication protocols which precede the one by Song, and require the server to compute the computationally intensive modular exponentiation, like the one by Xu et al., or Lee at al., are prone to the clogging attack. We then suggest an improvement on the protocol to prevent the clogging attack.

The other protocol we consider is a two-party identity-based authenticated key agreement protocol by H\"olbl et al. They have devised two such protocols in their work. They call them Protocol 1 and Protocol 2. Both the protocols have already been shown vulnerable to the insider attack in a recent work by Chen et al. Here we consider Protocol 2 and show its vulnerability to a simple man-in-the-middle attack where the adversary does not know or calculate either party's private key, or the session key. Protocol 2 by H\"olbl et al is an improvement over a previous work by Tseng. This makes the Tseng's protocol vulnerable to the attack we illustrate. We further suggest an additional step for these protocols to make them immune against the man-in-the-middle attack.

Category / Keywords: cryptographic protocols / smart cards, cryptanalysis, key management

Publication Info: 30th IEEE International Performance Computing and Communications Conference (IPCCC 2011)

Date: received 1 Feb 2011, last revised 2 Dec 2011

Contact author: sroy7 at buffalo edu

Available format(s): PDF | BibTeX Citation

Note: Publication information added.

Version: 20111202:193610 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]