Cryptology ePrint Archive: Report 2010/165

Comment on four two-party authentication protocols

Yalin Chen, Jue-Sam Chou, Chun-Hui Huang

Abstract: In this paper, we analyze the protocols of Bindu et al., Goriparthi et al., Wang et al. and Hölbl et al.. After analyses, we found that Bindu et al.’s protocol suffers from the insider attack if the smart card is lost, both Goriparthi et al.’s and Wang et al.’s protocols can’t withstand the DoS attack on the password change phase which makes the password invalid after the protocol run, and Hölbl et al.’s protocol is vulnerable to the insider attack since a malevolent legal user can deduce KGC’s secret key xs.

Category / Keywords: cryptographic protocols / password authentication protocol, insider attack, denial-of-service attack, smart card lost problem, mutual authentication, man-in-the-middle attack

Date: received 27 Mar 2010

Contact author: jschou at mail nhu edu tw

Available format(s): PDF | BibTeX Citation

Version: 20100328:184435 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]