RUS  ENG
Full version
JOURNALS // Program Systems: Theory and Applications // Archive

Program Systems: Theory and Applications, 2015 Volume 6, Issue 1, Pages 135–145 (Mi ps160)

This article is cited in 2 papers

Hardware, software and distributed supercomputer systems

On the cryptographic security of the “BotikKey” authentication protocol against attacks on MD5 hash function

A. A. Kuznetsov

Program Systems Institute of RAS

Abstract: In this paper vulnerabilities of the BotikKey network protocol are described. It is being used in the “Botik” telecommunication system of Pereslavl-Zalesskiy for secure subscribers' authentication. Protocol was developed as part of Botik-technologies initiative, according to which all software and hardware is based on open source, or on the inhouse developments. We outline the purpose and implementation details of the protocol and its pros and cons. It is pointed out that majority of the protocol's vulnerabilities arise from the weaknesses of MD5 cryptographic hash function being used. With a number of assumptions, the BotikKey protocol can be compromised by committing an APOP-attack on a subscriber. It is noted that “Botik” network service provider should use contemporary cryptographic methods for subscribers' authentication or avoid using the BotikKey system at all. (In Russian).

Key words and phrases: BotikKey protocol, secure authentication, cryptography, MD5 hash function, APOP attack.

UDC: 519.682.3

Received: 26.12.2014
Accepted: 24.02.2015



© Steklov Math. Inst. of RAS, 2025