The Community for Technology Leaders
2011 13th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (2005)
Timisoara, Romania
Sept. 25, 2005 to Sept. 29, 2005
ISBN: 0-7695-2453-2
pp: 147-153
Bogdan Groza , "Politehnica" University of Timisoara
Dorina Petrica , "Politehnica" University of Timisoara
ABSTRACT
Authentication protocols have applications in many fields. The security of authentication protocols is commonly based on cryptographic primitives. Constructing secure authentication protocols is not an easy challenge and there is a large number of authentication protocols that prove to be insecure. Wulf et al. have proposed in [1] a protocol by which an entity can authenticate in a distributed system environment without using any shared secret. This paper will make a brief analysis of the proposed protocol and will show how it can be broken. The protocol will be broken by using multiplicative inverses of the integers from Z_n , where n is a prime number.
INDEX TERMS
null
CITATION
Bogdan Groza, Dorina Petrica, "Cryptanalysis of an Authentication Protocol", 2011 13th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, vol. 00, no. , pp. 147-153, 2005, doi:10.1109/SYNASC.2005.29
388 ms
(Ver 3.3 (11022016))