Text this: Rational analysis of authentication protocols based on NGUYEN L H scheme