There are several points where the security of the authentication protocol can be attacked. We address each below:
To do so requires that either E have a copy of or that the Digital Signature Algorithm is insecure. Since the Digital Signature Algorithm uses the computationally secure [13] cryptographic hash function SHA-1 for message digests and the RawDSA algorithm for signing data, the protocol is as secure as these algorithms.