Skip to main content

Advances, Systems and Applications

Table 1 Security analysis of the proposed scheme using Scyther during authentication phase

From: MDA: message digest-based authentication for mobile cloud computing

Role

Sl.Num.

Claim

Status

Comment

Mobile

1

secret A u t h_Key i

Ok

No Attacks

 

2

secret SI

Ok

No Attacks

 

3

secret password

Ok

No Attacks

 

4

secret userID

Ok

No Attacks

 

5

secret M D user

Ok

No Attacks

 

6

secret M D cloud

Ok

No Attacks

 

7

Alive

Ok

No Attacks

 

8

Weakagree

Ok

No Attacks

 

9

Niagree

Ok

No Attacks

 

10

Nisynch

Ok

No Attacks

Cloud

1

secret A u t h_Key i

Ok

No Attacks

 

2

secret password

Ok

No Attacks

 

3

secret userID

Ok

No Attacks

 

4

secret SI

Ok

No Attacks

 

5

Alive

Ok

No Attacks

 

6

Weakagree

Ok

No Attacks

 

7

Niagree

Ok

No Attacks

 

8

Nisynch

Ok

No Attacks