{"title":"Security analysis of Three-Factor Authentication Protocol Based on Extended Chaotic-Maps","authors":"Suresh Devanapalli, Kolloju Phaneendra","doi":"10.1109/OTCON56053.2023.10113994","DOIUrl":null,"url":null,"abstract":"In data security network communication, the authentication protocol is crucial. Therefore, the authentication protocol must offer protection against all recognised threats, including password guessing, insider, and identity theft assaults. However, a lot of protocols in the literature fall short of these security standards. In this paper, we evaluate the very lately put out Shuming et al. protocl. The three-factor authentication protocol demonstrates that it is susceptible to assaults from privileged insiders, offline password guessing attacks, user identity attacks, and parallel session attacks; as a result, their system is unable to thwart known session-based transient data attacks. Additionally, it lacks robust user anonymity and is susceptible to DoS and smart card loss attacks.","PeriodicalId":265966,"journal":{"name":"2022 OPJU International Technology Conference on Emerging Technologies for Sustainable Development (OTCON)","volume":"239 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 OPJU International Technology Conference on Emerging Technologies for Sustainable Development (OTCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/OTCON56053.2023.10113994","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In data security network communication, the authentication protocol is crucial. Therefore, the authentication protocol must offer protection against all recognised threats, including password guessing, insider, and identity theft assaults. However, a lot of protocols in the literature fall short of these security standards. In this paper, we evaluate the very lately put out Shuming et al. protocl. The three-factor authentication protocol demonstrates that it is susceptible to assaults from privileged insiders, offline password guessing attacks, user identity attacks, and parallel session attacks; as a result, their system is unable to thwart known session-based transient data attacks. Additionally, it lacks robust user anonymity and is susceptible to DoS and smart card loss attacks.