Employing Secure and Efficient Password-Authenticated Key Exchange in Wireless Networks

被引:0
作者
Chuang, Po-Jen [1 ]
Liao, Yi-Ping [1 ]
机构
[1] Tamkang Univ, Dept Elect & Comp Engn, Tamsui 251, Taiwan
来源
JOURNAL OF APPLIED SCIENCE AND ENGINEERING | 2015年 / 18卷 / 04期
关键词
Wireless Networks; Client-to-Client Password-Authenticated Key Exchange (C2C PAKE); Cross-Realm; Smart Cards; Security Models; Performance Evaluation;
D O I
10.6180/jase.2015.18.4.12
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The password-authenticated key exchange (PAKE) is an important tool to secure wireless communications. To counter possible malicious attacks in wireless communications, this paper develops a stronger new cross-realm client-to-client (C2C) PAKE protocol based on the smart card framework agreement. Employing the client passwords, smart card information and server private keys, the new PAKE protocol works by the Mod calculation, Asymmetric encryption and Diffie-Hellman operations. It can practically enhance the security of wireless communications even when both client passwords and server private keys are snatched. To verify the performance of the new protocol, we bring in the Yoneyama's security model which can verify very intrigue attacks (including key-compromise impersonation and leakage of ephemeral private attacks) to check the security levels of existing C2C PAKE protocols and our protocol. The collected cost comparison results show that, in contrast to other protocols, our new protocol yields notably better security gain at very reasonable cost.
引用
收藏
页码:407 / 418
页数:12
相关论文
共 22 条
  • [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
  • [2] Bellare M., 1994, Advances in Cryptology - CRYPTO '93. 13th Annual International Cryptology Conference Proceedings, P232
  • [3] BELLARE M, 1996, P 28 ANN ACM S THEOR, P57
  • [4] Bellare M., 2000, LNCS, V1807, P140
  • [5] Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
  • [6] Byun JW, 2002, LECT NOTES COMPUT SC, V2513, P134
  • [7] Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
  • [8] Coffee T., 2004, BEST KEPT SECRETS EL
  • [9] Daemen J., 2020, DESIGN RIJNDAEL AES, pX
  • [10] Cryptoanalysis and Improvements of Cross-Realm C2C-PAKE Protocol
    Ding XiaoFei
    Ma ChuanGui
    [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL I, 2009, : 193 - 196