Cryptanalysis of an efficient three-party password-based key exchange scheme

被引:3
|
作者
Yoon, Eun-Jun [1 ]
Yoo, Kee-Young [1 ]
机构
[1] Kyungil Univ, Dept Cyber Secur, Gyongsan, South Korea
关键词
Cryptography; Key exchange; Password; Three-party; authentication; PROTOCOL;
D O I
10.1016/j.proeng.2012.01.604
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
In order to secure communications between two clients with a trusted server's help in public network environments, a three-party password-based authenticated key exchange (3PAKE) scheme is used to provide the transaction confidentiality and efficiency. In 2010, Lou-Huang proposed a new simple three-party password-based authenticated key exchange (LH-3PAKE) scheme based on elliptic curve cryptography (ECC). By analysis, Lou-Huang claimed that the proposed LH-3PAKE scheme is not only secure against various attacks, but also more efficient than previously proposed 3PAKE schemes. However, this paper demonstrates LH-3PAKE scheme is vulnerable to off-line password guessing attacks by an attacker. c (C)2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of Harbin University of Science and Technology
引用
收藏
页码:3972 / 3979
页数:8
相关论文
共 50 条
  • [41] Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
    Chen, Chien-Ming
    Wang, King-Hang
    Yeh, Kuo-Hui
    Xiang, Bin
    Wu, Tsu-Yang
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (08) : 3133 - 3142
  • [42] An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
    Mohammad Sabzinejad Farash
    Mahmoud Ahmadian Attari
    Nonlinear Dynamics, 2014, 77 : 399 - 411
  • [43] Simple password-based three-party authenticated key exchange without server public keys
    Lee, Tian-Fu
    Hwang, Tzonelih
    INFORMATION SCIENCES, 2010, 180 (09) : 1702 - 1714
  • [44] Offline dictionary attack on a universally composable three-party password-based key exchange protocol
    Yuan, Wei
    Hu, Liang
    Li, Hongtu
    Chu, Jianfeng
    CEIS 2011, 2011, 15
  • [45] An efficient three-party password-based key agreement protocol using extended chaotic maps
    舒剑
    Chinese Physics B, 2015, (06) : 235 - 242
  • [46] An Efficient Password Security of Three-Party Key Exchange Protocol based on ECDLP
    Kar, Jayaprakash
    Majhi, Banshidhar
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2009, 3 (04): : 25 - 32
  • [47] Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
    Chien-Ming Chen
    King-Hang Wang
    Kuo-Hui Yeh
    Bin Xiang
    Tsu-Yang Wu
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 3133 - 3142
  • [48] An efficient three-party password-based key agreement protocol using extended chaotic maps
    Shu Jian
    CHINESE PHYSICS B, 2015, 24 (06)
  • [49] Password-based authenticated key distribution in the three-party setting with forward security
    Wu, Shuhua
    Zhu, Yuefei
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2009, 3 (04) : 393 - 407
  • [50] Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
    Hu, Xuexian
    Zhang, Zhenfeng
    NONLINEAR DYNAMICS, 2014, 78 (02) : 1293 - 1300