[Resource Topic] 2010/165: Comment on four two-party authentication protocols

Welcome to the resource topic for 2010/165

Title:
Comment on four two-party authentication protocols

Authors: Yalin Chen, Jue-Sam Chou, Chun-Hui Huang

Abstract:

In this paper, we analyze the protocols of Bindu et al., Goriparthi et al., Wang et al. and Hölbl et al… After analyses, we found that Bindu et al.’s protocol suffers from the insider attack if the smart card is lost, both Goriparthi et al.’s and Wang et al.’s protocols can’t withstand the DoS attack on the password change phase which makes the password invalid after the protocol run, and Hölbl et al.’s protocol is vulnerable to the insider attack since a malevolent legal user can deduce KGC’s secret key xs.

ePrint: https://eprint.iacr.org/2010/165

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .