Reverse Online Guessing Attacks on PAKE Protocols
securityresearch
Source: Arxiv (cs.CR + cs.AI)February 9, 2026Summary
This paper identifies a vulnerability in password-authenticated key exchange (PAKE) protocols called "reverse online guessing attacks," where an adversary validates password guesses by impersonating a server rather than a client. The attack is particularly effective in phishing, password-spraying scenarios, or applications with automated logins like WPA3-SAE, and exploits the fact that PAKE protocols lack server authentication mechanisms beyond the password itself.
Original source: https://arxiv.org/abs/2602.08993v1
First tracked: February 11, 2026 at 06:00 PM