Man-In-The-Middle Attack against Certain Authentication Protocols Revisited: Insights into the Approach and Performances Re-Evaluation
We address a class of authentication protocols called “HB” ones and the man-in-the-middle (MIM) attack, reported at the ASIACRYPT conference, called OOV-MIM (Ouafi-Overbeck-Vaudenay MIM). Analysis of the considered attack and its systematic experimental evaluation are given. It is shown that the mai...
Main Authors: | Milica Knežević, Siniša Tomović, Miodrag J. Mihaljević |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-08-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/9/8/1296 |
Similar Items
-
Analysis and Correction of the Attack against the LPN-Problem Based Authentication Protocols
by: Siniša Tomović, et al.
Published: (2021-03-01) -
Safety for Low-Cost RFID Tags Using Lightweight Authentication Protocol
by: A. V. Starikovskiy, et al.
Published: (2010-06-01) -
IoT Device Security: Challenging “A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function”
by: Ygal Bendavid, et al.
Published: (2018-12-01) -
Comments on “ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes”
by: Sungjin Yu, et al.
Published: (2021-01-01) -
Questioning the Security of Three Recent Authentication and Key Agreement Protocols
by: Amir Masoud Rahmani, et al.
Published: (2021-01-01)