Attack on server assisted authentication protocols
Attack on server assisted authentication protocols
- Author(s): R.J. Anderson
- DOI: 10.1049/el:19920937
For access to this article, please select a purchase option:
Buy article PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
Electronics Letters — Recommend this title to your library
Thank you
Your recommendation has been sent to your librarian.
- Author(s): R.J. Anderson 1
-
-
View affiliations
-
Affiliations:
1: University Computer Laboratory, University of Cambridge, Cambridge, UK
-
Affiliations:
1: University Computer Laboratory, University of Cambridge, Cambridge, UK
- Source:
Volume 28, Issue 15,
16 July 1992,
page
1473
DOI: 10.1049/el:19920937 , Print ISSN 0013-5194, Online ISSN 1350-911X
- « Previous Article
- Table of contents
- Next Article »
© The Institution of Electrical Engineers
Published
The basic server-assisted authentication protocol of Matsumoto et al. can be broken in a one-round active attack. The improvements necessary to make it secure may well render it impractical.
Inspec keywords: security of data; protocols
Other keywords: one-round active attack; server assisted authentication protocols
References
-
-
1)
- N. Ferguson , J. Bos . RSA library for smartcard, Advances in Cryptology—Eurocrypt 92.
-
2)
- J. Feigenbaum . Encrypting problem instances, Advances in Cryptology—Crypto 85.
-
3)
- E. Brickell , D.M. Gordon , K.S. McCurrley , D. Wilson . Fast exponentiation with precomputation, Advances in Cryptology—Eurocrypt 92.
-
4)
- Burns, J., Mitchell, C.J.: `On parameter selection for server-aided RSA computation schemes', CSD-TR-91-13, Technical Report, .
-
5)
- A. Shimbo , S. Kawamura . Factorisation attack on certain server-aided protocols for the RSA secret transformation. Electron. Lett. , 1387 - 1388
-
6)
- T. Matsumoto , K. Kato , H. Imai . (1989) Speeding up secret computations with insecure auxiliary devices, Advances in Cryptology—Crypto 88.
-
7)
- S. Kawamura , A. Shimbo . Performance analysis of server-aided secret computation protocols for the RSA cryptosystem. Trans. Inst. Electron. Inf. Commun. Eng. , 7 , 1073 - 1080
-
8)
- R.L. Rivest , A. Shamir , L. Adleman . A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM , 120 - 126
-
9)
- B. Pfitzmann , M. Waidner . Attacks for server-aided RSA computation, Advances in Cryptology—Eurocrypt 92.
-
1)
http://iet.metastore.ingenta.com/content/journals/10.1049/el_19920937

Related content
content/journals/10.1049/el_19920937
pub_keyword,iet_inspecKeyword,pub_concept
6
6
