{"title":"基于扩展混沌映射的三因素认证协议安全性分析","authors":"Suresh Devanapalli, Kolloju Phaneendra","doi":"10.1109/OTCON56053.2023.10113994","DOIUrl":null,"url":null,"abstract":"In data security network communication, the authentication protocol is crucial. Therefore, the authentication protocol must offer protection against all recognised threats, including password guessing, insider, and identity theft assaults. However, a lot of protocols in the literature fall short of these security standards. In this paper, we evaluate the very lately put out Shuming et al. protocl. The three-factor authentication protocol demonstrates that it is susceptible to assaults from privileged insiders, offline password guessing attacks, user identity attacks, and parallel session attacks; as a result, their system is unable to thwart known session-based transient data attacks. Additionally, it lacks robust user anonymity and is susceptible to DoS and smart card loss attacks.","PeriodicalId":265966,"journal":{"name":"2022 OPJU International Technology Conference on Emerging Technologies for Sustainable Development (OTCON)","volume":"239 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security analysis of Three-Factor Authentication Protocol Based on Extended Chaotic-Maps\",\"authors\":\"Suresh Devanapalli, Kolloju Phaneendra\",\"doi\":\"10.1109/OTCON56053.2023.10113994\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In data security network communication, the authentication protocol is crucial. Therefore, the authentication protocol must offer protection against all recognised threats, including password guessing, insider, and identity theft assaults. However, a lot of protocols in the literature fall short of these security standards. In this paper, we evaluate the very lately put out Shuming et al. protocl. The three-factor authentication protocol demonstrates that it is susceptible to assaults from privileged insiders, offline password guessing attacks, user identity attacks, and parallel session attacks; as a result, their system is unable to thwart known session-based transient data attacks. Additionally, it lacks robust user anonymity and is susceptible to DoS and smart card loss attacks.\",\"PeriodicalId\":265966,\"journal\":{\"name\":\"2022 OPJU International Technology Conference on Emerging Technologies for Sustainable Development (OTCON)\",\"volume\":\"239 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 OPJU International Technology Conference on Emerging Technologies for Sustainable Development (OTCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/OTCON56053.2023.10113994\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 OPJU International Technology Conference on Emerging Technologies for Sustainable Development (OTCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/OTCON56053.2023.10113994","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security analysis of Three-Factor Authentication Protocol Based on Extended Chaotic-Maps
In data security network communication, the authentication protocol is crucial. Therefore, the authentication protocol must offer protection against all recognised threats, including password guessing, insider, and identity theft assaults. However, a lot of protocols in the literature fall short of these security standards. In this paper, we evaluate the very lately put out Shuming et al. protocl. The three-factor authentication protocol demonstrates that it is susceptible to assaults from privileged insiders, offline password guessing attacks, user identity attacks, and parallel session attacks; as a result, their system is unable to thwart known session-based transient data attacks. Additionally, it lacks robust user anonymity and is susceptible to DoS and smart card loss attacks.