Your browser does not support JavaScript!

Attack on server assisted authentication protocols

Attack on server assisted authentication protocols

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Electronics Letters — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The basic server-assisted authentication protocol of Matsumoto et al. can be broken in a one-round active attack. The improvements necessary to make it secure may well render it impractical.


    1. 1)
      • N. Ferguson , J. Bos . RSA library for smartcard, Advances in Cryptology—Eurocrypt 92.
    2. 2)
      • J. Feigenbaum . Encrypting problem instances, Advances in Cryptology—Crypto 85.
    3. 3)
      • E. Brickell , D.M. Gordon , K.S. McCurrley , D. Wilson . Fast exponentiation with precomputation, Advances in Cryptology—Eurocrypt 92.
    4. 4)
      • Burns, J., Mitchell, C.J.: `On parameter selection for server-aided RSA computation schemes', CSD-TR-91-13, Technical Report, .
    5. 5)
      • A. Shimbo , S. Kawamura . Factorisation attack on certain server-aided protocols for the RSA secret transformation. Electron. Lett. , 1387 - 1388
    6. 6)
      • T. Matsumoto , K. Kato , H. Imai . (1989) Speeding up secret computations with insecure auxiliary devices, Advances in Cryptology—Crypto 88.
    7. 7)
      • S. Kawamura , A. Shimbo . Performance analysis of server-aided secret computation protocols for the RSA cryptosystem. Trans. Inst. Electron. Inf. Commun. Eng. , 7 , 1073 - 1080
    8. 8)
      • R.L. Rivest , A. Shamir , L. Adleman . A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM , 120 - 126
    9. 9)
      • B. Pfitzmann , M. Waidner . Attacks for server-aided RSA computation, Advances in Cryptology—Eurocrypt 92.

Related content

This is a required field
Please enter a valid email address