Cryptanalysis on Four Two-Party Authentication Protocols

Yalin Chen,Jue-Sam Chou*,Chun-Hui Huang
DOI: https://doi.org/10.48550/arXiv.1007.0060
2010-07-01
Abstract:In this paper, we analyze four authentication protocols of Bindu et al., Goriparthi et al., Wang et al. and Hölbl et al.. After investigation, we reveal several weaknesses of these schemes. First, Bindu et al.'s protocol suffers from an insider impersonation attack if a malicious user obtains a lost smart card. Second, both Goriparthi et al.'s and Wang et al.'s protocols cannot withstand a DoS attack in the password change phase, i.e. an attacker can involve the phase to make user's password never be used in subsequent authentications. Third, Hölbl et al.'s protocol is vulnerable to an insider attack since a legal but malevolent user can deduce KGC's secret key.
Cryptography and Security
What problem does this paper attempt to address?