Skip to main content
Log in

VQR: vulnerability analysis in quadratic residues-based authentication protocols

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Ensuring security and respect for users’ privacy, especially in electronic health-care systems, is an important task that is achievable by authentication protocols. The security of many protocols is based on public-key cryptography, the breaking of which depends on solving a hard problem, e.g. Quadratic Residue (QR) which is compatible with constrained devices and is based on integer factoring with the Mean time complexity of \(exp\left( \left( c+o(1)\right) \log ^{1/3}(n) \log ^{2/3}\left( \log (n)\right) \right) \) for some \(c<2\). In this paper, we introduce a vulnerability in QR-based problems for reducing the time complexity from Mean case to Min one and present an algorithm with time complexity \(O(\log ^2(n))\) to calculate user’s session keys and finding confidential user’s data by passive monitoring of the transmitted data over public networks for 2048-bit public keys in \(6.9 \mu s\). To prove the efficiency of the proposed attacks, we address 12 vulnerable QR-based authentication protocols and show that the structure of all vulnerable transmitted messages is limited to 6 cases while messages in \(\left( \sqrt{n},n-\sqrt{n}\right) \) are safe from the proposed method. Also, two recent authentication protocols have been analyzed in detail to show the consequences of the proposed vulnerability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Data availability

Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.

References

  • Bernstein DJ, Chang Y-A, Cheng C-M, Chou L-P, Heninger N, Lange T, Van Someren N (2013) Factoring RSA keys from certified smart cards: coppersmith in the wild. In: International conference on the theory and application of cryptology and information security. Springer, p 341–360

  • Bian W, Gope P, Cheng Y, Li Q (2020) Bio-AKA: an efficient fingerprint based two factor user authentication and key agreement scheme. Future Generation Comput Syst. https://doi.org/10.1016/j.future.2020.03.034

    Article  Google Scholar 

  • Boneh D et al (1999) Twenty years of attacks on the RSA cryptosystem. Not AMS 46(2):203–213

    MathSciNet  MATH  Google Scholar 

  • Cao T, Chen X, Doss R, Zhai J, Wise LJ, Zhao Q (2016) RFID ownership transfer protocol based on cloud. Comput Netw 105:47–59

    Article  Google Scholar 

  • Chaudhry SA, Shon T, Al-Turjman F, Alsharif MH (2020) Correcting design flaws: an improved and cloud assisted key agreement scheme in cyber physical systems. Comput Commun 153:527–537

    Article  Google Scholar 

  • Chen Y, Chou J-S, Sun H-M (2008) A novel mutual authentication scheme based on quadratic residues for RFID systems. Comput Netw 52(12):2373–2380

    Article  MATH  Google Scholar 

  • Chiou S-Y, Chang S-Y (2018) An enhanced authentication scheme in mobile RFID system. Ad Hoc Netw 71:1–13

    Article  Google Scholar 

  • Doss R, Zhou W, Yu S (2012) Secure rfid tag ownership transfer based on quadratic residues. IEEE Trans Inf Forensic Secur 8(2):390–401

    Article  Google Scholar 

  • Doss R, Sundaresan S, Zhou W (2013) A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Netw 11(1):383–396

    Article  Google Scholar 

  • Ghahramani M, Javidan R, Shojafar M (2020) A secure biometric-based authentication protocol for global mobility networks in smart cities. J Supercomput. https://doi.org/10.1007/s11227-020-03160-x

    Article  Google Scholar 

  • Ghahramani M, Javidan R, Shojafar M, Taheri R, Alazab M, Tafazolli R (2021) RSS: an energy-efficient approach for securing IoT service protocols against the DoS attack. IEEE Internet Things J 8(5):3619–3635

    Article  Google Scholar 

  • Gudeme JR, Pasupuleti SK, Kandukuri R (2020) Attribute-based public integrity auditing for shared data with efficient user revocation in cloud storage. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-02302-6

    Article  Google Scholar 

  • Gupta M, Chaudhari NS (2019) Anonymous two factor authentication protocol for roaming service in global mobility network with security beyond traditional limit. Ad Hoc Netw 84:56–67

    Article  Google Scholar 

  • HaddadPajouh H, Dehghantanha A, Parizi RM, Aledhari M, Karimipour H (2019) A survey on internet of things security: requirements, challenges, and solutions. Internet Things 14:100129

    Article  Google Scholar 

  • HaddadPajouh H, Khayami R, Dehghantanha A, Choo K-KR, Parizi RM (2020) AI4SAFE-IoT: an AI-powered secure architecture for edge layer of internet of things. Neural Comput Appl. https://doi.org/10.1007/s00521-020-04772-3

    Article  Google Scholar 

  • Jiang Q, Ma J, Yang C, Ma X, Shen J, Chaudhry SA (2017) Efficient end-to-end authentication protocol for wearable health monitoring systems. Comput Electr Eng 63:182–195

    Article  Google Scholar 

  • Jin Y, Zhu H, Shi Z, Lu X, Sun L (2015) Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues. In: 2015 IEEE international conference on communications (ICC), IEEE, p 7234–7239

  • Khan MN, Rao A, Camtepe S (2020) Lightweight cryptographic protocols for IoT constrained devices: a survey. IEEE Internet Things J 8:4132–4156

    Article  Google Scholar 

  • Kumari S, Om H (2016) Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Comput Netw 104:137–154

    Article  Google Scholar 

  • Kumari S, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Generation Comput Syst 63:56–75

    Article  Google Scholar 

  • Lee T-F (2015) Enhancing the security of password authenticated key agreement protocols based on chaotic maps. Inf Sci 290:63–71

    Article  MATH  Google Scholar 

  • Lee C-C, Chen S-D, Li C-T, Cheng C-L, Lai Y-M (2019) Security enhancement on an RFID ownership transfer protocol based on cloud. Future Generation Comput Syst 93:266–277

    Article  Google Scholar 

  • Lee C-C, Li C-T, Cheng C-L, Lai Y-M (2019) A novel group ownership transfer protocol for RFID systems. Ad Hoc Netw 91:101873

    Article  Google Scholar 

  • Lin H-Y (2015) Improved chaotic maps-based password-authenticated key agreement using smart cards. Commun Nonlinear Sci Numer Simul 20(2):482–488

    Article  MATH  Google Scholar 

  • Ling D, Chen K (2012) Cryptographic protocol: security analysis based on trusted freshness. Higher Education Press

    MATH  Google Scholar 

  • Mishra D (2016) Design and analysis of a provably secure multi-server authentication scheme. Wirel Pers Commun 86(3):1095–1119

    Article  Google Scholar 

  • Neshenko N, Bou-Harb E, Crichigno J, Kaddoum G, Ghani N (2019) Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Commun Surv Tutor 21(3):2702–2733

    Article  Google Scholar 

  • Nitaj A, Rachidi T (2015) Factoring RSA moduli with weak prime factors. In: International conference on codes, cryptology, and information security. Springer, p 361–374

  • Ostad-Sharif A, Abbasinezhad-Mood D, Nikooghadam M (2019) Efficient utilization of elliptic curve cryptography in design of a three-factor authentication protocol for satellite communications. Comput Commun 147:85–97

    Article  Google Scholar 

  • Qi M, Chen J (2018) New robust biometrics-based mutual authentication scheme with key agreement using elliptic curve cryptography. Multimed Tools Appl 77(18):23335–23351

    Article  Google Scholar 

  • Qi M, Chen J, Chen Y (2018) A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC. Comput Methods Programs Biomed 164:101–109

    Article  Google Scholar 

  • Reddy AG, Yoon E-J, Das AK, Odelu V, Yoo K-Y (2017) Design of mutually authenticated key agreement protocol resistant to impersonation attacks for multi-server environment. IEEE Access 5:3622–3639

    Article  Google Scholar 

  • Rivest RL, Silverman RD (1999) Arestrong’primes needed for RSA? In: In the 1997 RSA laboratories seminar series, seminar proceedings. Citeseer

  • Roy S, Chatterjee S, Das AK, Chattopadhyay S, Kumari S, Jo M (2017) Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing internet of things. IEEE Internet Things J 5(4):2884–2895

    Article  Google Scholar 

  • Roychoudhury P, Roychoudhury B, Saikia DK (2018) Provably secure group authentication and key agreement for machine type communication using Chebyshev’s polynomial. Comput Commun 127:146–157

    Article  Google Scholar 

  • Saeed MES, Liu Q-Y, Tian G, Gao B, Li F (2018) Remote authentication schemes for wireless body area networks based on the internet of things. IEEE Internet Things J 5(6):4926–4944

    Article  Google Scholar 

  • Sundaresan S, Doss R, Piramuthu S, Zhou W (2017) A secure search protocol for low cost passive RFID tags. Comput Netw 122:70–82

    Article  Google Scholar 

  • Sundaresan S, Doss R, Zhou W (2012) A secure search protocol based on quadratic residues for EPC class-1 gen-2 UHF RFID tags. In: 2012 IEEE 23rd international symposium on personal, indoor and mobile radio communications-(PIMRC). IEEE, p 30–35

  • Taheri R, Ghahramani M, Javidan R, Shojafar M, Pooranian Z, Conti M (2020) Similarity-based android malware detection using hamming distance of static binary features. Future Generation Comput Syst 105:230–247

    Article  Google Scholar 

  • Wu F, Xu L, Kumari S, Li X (2017) A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security. J Ambient Intell Humaniz Comput 8(1):101–116

    Article  Google Scholar 

  • Xu D, Chen J, Liu Q (2019) Provably secure anonymous three-factor authentication scheme for multi-server environments. J Ambient Intell Humaniz Comput 10(2):611–627

    Article  Google Scholar 

  • Yeh T-C, Wu C-H, Tseng Y-M (2011) Improvement of the RFID authentication scheme based on quadratic residues. Comput Commun 34(3):337–341

    Article  Google Scholar 

  • Zhang L, Luo H, Zhao L, Zhang Y (2018) Privacy protection for point-of-care using chaotic maps-based authentication and key agreement. J Med Syst 42(12):250

    Article  Google Scholar 

  • Zhang Y, He D, Li L, Chen B (2020) A lightweight authentication and key agreement scheme for internet of drones. Comput Commun. https://doi.org/10.1016/j.comcom.2020.02.067

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Meysam Ghahramani.

Ethics declarations

Human and animal participants

This article does not contain any studies with human participants or animals performed by any of the authors. The authors declare that they have no conflict of interest and this study was not funded by any organizations. Also, no datasets were generated or analyzed during the current study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ghahramani, M., HaddadPajouh, H., Javidan, R. et al. VQR: vulnerability analysis in quadratic residues-based authentication protocols. J Ambient Intell Human Comput 14, 7559–7574 (2023). https://doi.org/10.1007/s12652-023-04557-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-023-04557-1

Keywords

Navigation