In this work, we argue that the usage of computationally intensive mathematical operations in password authentication protocols can lead to security vulnerability in the protocol. We formulate a generalized algorithm for cryptanalysis to perform clogging attack (a form of denial of service) on protocols which use the computationally intensive modular exponentiation to guarantee security. We then apply this technique to cryptanalyze four recent password authentication protocols, and observe all four of them to be prone to the clogging attack. The first one by Yang et al. is a password-based authentication scheme to preserve identity privacy. This protocol does not use timestamps. The second protocol we consider for analysis is by Islam. This...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
Recently, Liao et al. and Hölbl et al. each proposed a user authentication protocol, respectively. B...
The design of secure and efficient smart-card-based password authentication schemes remains a challe...
Abstract. In this work we consider two protocols for performing crypt-analysis and security enhancem...
In this work we consider two protocols for performing cryptanalysis and security enhancement. The fi...
Abstract—In this paper we study a scheme for making cryptanalysis and security improvement. This pro...
In this thesis, the author hypothesizes that the use of computationally intensive mathematical opera...
In this work we compute the energy generated by modular exponentiation, a widely used powerful tool ...
In this work we consider two elliptic curve cryptography based authentication protocols for performi...
Abstract: Remote authentication is a method to authenticate remote users over insecure communication...
[[abstract]]Remote authentication is an essential part of the rapid-growing electronic commerce. Rec...
The intent of this paper is to present the flaws and weaknesses of Kim et al.'s timestamp-based pass...
password-based practical authentication scheme using one-way collision-resistant hash functions. How...
AbstractThe security of a password authentication scheme using smart cards proposed by Liao et al. [...
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme i...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
Recently, Liao et al. and Hölbl et al. each proposed a user authentication protocol, respectively. B...
The design of secure and efficient smart-card-based password authentication schemes remains a challe...
Abstract. In this work we consider two protocols for performing crypt-analysis and security enhancem...
In this work we consider two protocols for performing cryptanalysis and security enhancement. The fi...
Abstract—In this paper we study a scheme for making cryptanalysis and security improvement. This pro...
In this thesis, the author hypothesizes that the use of computationally intensive mathematical opera...
In this work we compute the energy generated by modular exponentiation, a widely used powerful tool ...
In this work we consider two elliptic curve cryptography based authentication protocols for performi...
Abstract: Remote authentication is a method to authenticate remote users over insecure communication...
[[abstract]]Remote authentication is an essential part of the rapid-growing electronic commerce. Rec...
The intent of this paper is to present the flaws and weaknesses of Kim et al.'s timestamp-based pass...
password-based practical authentication scheme using one-way collision-resistant hash functions. How...
AbstractThe security of a password authentication scheme using smart cards proposed by Liao et al. [...
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme i...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
Recently, Liao et al. and Hölbl et al. each proposed a user authentication protocol, respectively. B...
The design of secure and efficient smart-card-based password authentication schemes remains a challe...