Cryptology ePrint Archive: Report 2013/380
Comments on Three Multi-Server Authentication Protocols
Yalin Chen 1, *Jue-Sam Chou2, Wen-Yi Tsai 3
Abstract: Recently, Tsai et al., Liao et al. and Li et al. each proposed a multi-server authentication protocol. They claimed their protocols are secure and can withstand various attacks. However, we found some security loopholes in each of their schemes, for example, both Tsai et al.’s and Liao et al.‘s schemes suffers from server spoofing attack by an insider server. Li et al.s’ suffers from the lost smart card password-guessing attack. In addition, Liao et al.‘s scheme also has the off-line password-guessing attack. In this paper, we will first review then show the attacks on each of the schemes. Then, based on Li et al.’s scheme, we proposed a novel one and examined its security in several security features. After security analysis, we concluded that our protocol outperformed Li et al.’s scheme in the security feature of lost smart card password-guessing attack.
Keywords: multi-server, password authentication protocol
Category / Keywords: cryptographic protocols /
Date: received 12 Jun 2013
Contact author: jschou at mail nhu edu tw
Available format(s): PDF | BibTeX Citation
Version: 20130612:150533 (All versions of this report)
Short URL: ia.cr/2013/380
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]