“…The designed functions in the UMAP-and ULAP-type protocols are not strong cryptologic functions, but consist of compositions of weak triangular functions and need to be combined with rotation operation, as outlined in [20,29,31], 2. XOR, mod 2 m addition, and triangular functions are associative operations that are nonresistant to algebraic replay attacks [10,20]; therefore, the messages of a protocol should not be reduced to these operations, 3. The operations follow a weak chain towards the main secret (ID), where intermediary messages are decrypted to capture the terms of the message that contains the ID [20,22,23], 4.…”