Program Systems: Theory and Applications
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Guidelines for authors
Submit a manuscript

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Program Systems: Theory and Applications:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Program Systems: Theory and Applications, 2015, Volume 6, Issue 1, Pages 147–156 (Mi ps161)  

Hardware, software and distributed supercomputer systems

Research into the issue of BotikKey protocol resistance to the brute force attack

A. A. Kuznetsov

Program Systems Institute of RAS
References:
Abstract: In this paper vulnerabilities of the BotikKey network protocol are described. The protocol is being used in the “Botik” telecommunication system of Pereslavl-Zalessky for secure subscriber authentication. Protocol was developed as part of Botik-technologies initiative, according to which all software and hardware is based on open source, or on the inhouse developments. We outline the purpose and implementation details of the protocol. It is pointed out that majority of protocol vulnerabilities arise from weaknesses of MD5 cryptographic hash function being used. BotikKey protocol can be compromised in several ways: brute force attack for recovering plain network password using specific software on high-performance computing devices and cloud services, password attack using rainbow tables for MD5 hash function, and the password theft. It is noted that “Botik” network service provider should use more contemporary cryptographic methods for subscriber authentication, or even avoid using the BotikKey system. (In Russian).
Key words and phrases: BotikKey protocol, network access, subscribers secure authentication, rainbow tables, brute force, password search.
Received: 26.12.2014
Accepted: 24.02.2015
Document Type: Article
UDC: 519.682.3
Language: Russian
Citation: A. A. Kuznetsov, “Research into the issue of BotikKey protocol resistance to the brute force attack”, Program Systems: Theory and Applications, 6:1 (2015), 147–156
Citation in format AMSBIB
\Bibitem{Kuz15}
\by A.~A.~Kuznetsov
\paper Research into the issue of BotikKey protocol resistance to the brute force attack
\jour Program Systems: Theory and Applications
\yr 2015
\vol 6
\issue 1
\pages 147--156
\mathnet{http://mi.mathnet.ru/ps161}
Linking options:
  • https://www.mathnet.ru/eng/ps161
  • https://www.mathnet.ru/eng/ps/v6/i1/p147
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Program Systems: Theory and Applications
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2025