Program Systems: Theory and Applications
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Guidelines for authors
Submit a manuscript

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Program Systems: Theory and Applications:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Program Systems: Theory and Applications, 2015, Volume 6, Issue 1, Pages 135–145 (Mi ps160)  

This article is cited in 2 scientific papers (total in 2 papers)

Hardware, software and distributed supercomputer systems

On the cryptographic security of the “BotikKey” authentication protocol against attacks on MD5 hash function

A. A. Kuznetsov

Program Systems Institute of RAS
Full-text PDF (777 kB) Citations (2)
References:
Abstract: In this paper vulnerabilities of the BotikKey network protocol are described. It is being used in the “Botik” telecommunication system of Pereslavl-Zalesskiy for secure subscribers' authentication. Protocol was developed as part of Botik-technologies initiative, according to which all software and hardware is based on open source, or on the inhouse developments. We outline the purpose and implementation details of the protocol and its pros and cons. It is pointed out that majority of the protocol's vulnerabilities arise from the weaknesses of MD5 cryptographic hash function being used. With a number of assumptions, the BotikKey protocol can be compromised by committing an APOP-attack on a subscriber. It is noted that “Botik” network service provider should use contemporary cryptographic methods for subscribers' authentication or avoid using the BotikKey system at all. (In Russian).
Key words and phrases: BotikKey protocol, secure authentication, cryptography, MD5 hash function, APOP attack.
Received: 26.12.2014
Accepted: 24.02.2015
Document Type: Article
UDC: 519.682.3
Language: Russian
Citation: A. A. Kuznetsov, “On the cryptographic security of the “BotikKey” authentication protocol against attacks on MD5 hash function”, Program Systems: Theory and Applications, 6:1 (2015), 135–145
Citation in format AMSBIB
\Bibitem{Kuz15}
\by A.~A.~Kuznetsov
\paper On the cryptographic security of the ``BotikKey'' authentication protocol against attacks on MD5 hash function
\jour Program Systems: Theory and Applications
\yr 2015
\vol 6
\issue 1
\pages 135--145
\mathnet{http://mi.mathnet.ru/ps160}
Linking options:
  • https://www.mathnet.ru/eng/ps160
  • https://www.mathnet.ru/eng/ps/v6/i1/p135
  • This publication is cited in the following 2 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Program Systems: Theory and Applications
    Statistics & downloads:
    Abstract page:285
    Full-text PDF :84
    References:33
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024