The other protocol we consider for analysis is by Wang et al. This is a smart card based authentication protocol. We again perform the clogging (DoS) attack on this protocol via replay. We observe that all smart card based authentication protocols which precede the one by Wang et al., and require the server to compute the computationally intensive modular exponentiation are prone to the clogging attack. We suggest (another) improvement on the protocol to prevent the clogging attack, which also applies to the protocol by Jiang et. al.
Category / Keywords: cryptographic protocols / cryptanalysis, secret sharing. Original Publication (in the same form): ICACNI 2014 Date: received 13 Mar 2014 Contact author: s roy at unf edu Available format(s): PDF | BibTeX Citation Version: 20140313:202813 (All versions of this report) Short URL: ia.cr/2014/194 Discussion forum: Show discussion | Start new discussion