1. VQR: vulnerability analysis in quadratic residues-based authentication protocols.
- Author
-
Ghahramani, Meysam, HaddadPajouh, Hamed, Javidan, Reza, and Kumari, Saru
- Abstract
Ensuring security and respect for users' privacy, especially in electronic health-care systems, is an important task that is achievable by authentication protocols. The security of many protocols is based on public-key cryptography, the breaking of which depends on solving a hard problem, e.g. Quadratic Residue (QR) which is compatible with constrained devices and is based on integer factoring with the Mean time complexity of e x p c + o (1) log 1 / 3 (n) log 2 / 3 log (n) for some c < 2 . In this paper, we introduce a vulnerability in QR-based problems for reducing the time complexity from Mean case to Min one and present an algorithm with time complexity O (log 2 (n)) to calculate user's session keys and finding confidential user's data by passive monitoring of the transmitted data over public networks for 2048-bit public keys in 6.9 μ s . To prove the efficiency of the proposed attacks, we address 12 vulnerable QR-based authentication protocols and show that the structure of all vulnerable transmitted messages is limited to 6 cases while messages in n , n - n are safe from the proposed method. Also, two recent authentication protocols have been analyzed in detail to show the consequences of the proposed vulnerability. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF