Cryptanalysis and improvement of a password-based key exchange protocol

被引:0
|
作者
Liu, Feng-Mei [1 ]
Luo, Shi-Xin [2 ]
Ren, Chuan-Lun [3 ]
机构
[1] Informat Engn Univ, Dept Informat Res, Coll Informat Engn, Zhengzhou 450002, Peoples R China
[2] Aisino Corp, Beijing 100195, Peoples R China
[3] Beijing Univ Posts & Telecommun, Informat Secur Ctr, Beijing 100876, Peoples R China
来源
PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7 | 2008年
关键词
cryptanalysis; attack; password-based key exchange;
D O I
10.1109/ICMLC.2008.4621042
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In 2002, Yeh and Sun proposed a simple authenticated key agreement protocol resistant to password guessing attacks. And they provided a formal proof of security to show its strength against both passive and active adversaries. However, the scheme presented by Yeh and Sun has secure flaws. In this paper, we provide the secure analysis of the scheme and show that it can not resist the stolen-verifier attack and manin-the-middle attack. Then we presents an improved scheme of the Yeh-Sun's scheme which is resistant to the stolen-verifier attack combining with man-in-themiddle attack.
引用
收藏
页码:3668 / +
页数:2
相关论文
共 50 条
  • [31] A simple three-party password-based key exchange protocol
    Huang, Hui-Feng
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2009, 22 (07) : 857 - 862
  • [32] On a simple three-party password-based key exchange protocol'
    Lin, Ching-Ying
    Hwang, Tzonelih
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (11) : 1520 - 1532
  • [33] Universally Composable Three Party Password-based Key Exchange Protocol
    Deng Miaolei
    Ma Jianfeng
    Le Fulong
    CHINA COMMUNICATIONS, 2009, 6 (03) : 150 - 155
  • [34] Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme
    Wu, Shuhua
    Chen, Kefei
    Pu, Qiong
    Zhu, Yuefei
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2013, 26 (05) : 674 - 686
  • [35] Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework
    Hu, Xuexian
    Liu, Wenfen
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 144 - 153
  • [36] A Four-Party Password-based Authentication Key Exchange Protocol
    Liu, Xiumei
    Liu, Junjiang
    Chang, Guiran
    2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC), 2012, : 280 - 283
  • [37] A scalable password-based group key exchange protocol in the standard model
    Abdalla, Michel
    Pointcheval, David
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2006, 2006, 4284 : 332 - 347
  • [38] Universally Composable Three Party Password-based Key Exchange Protocol
    Deng Miaolei 1
    中国通信, 2009, 6 (03) : 150 - 155
  • [39] Efficient password-based group key exchange
    Lee, SM
    Hwang, JY
    Lee, DH
    TRUST AND PRIVACY IN DIGITAL BUSINESS, PROCEEDINGS, 2004, 3184 : 191 - 199
  • [40] Universally composable password-based key exchange
    Canetti, R
    Halevi, S
    Katz, J
    Lindell, Y
    MacKenzie, P
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 404 - 421