A Security Patch for a Three-Party Key Exchange Protocol

被引:0
|
作者
ZHAO Jianjie1
2.Department of Computer Science and Engineering
机构
基金
国家高技术研究发展计划(863计划);
关键词
information security; authentication; key exchange; man-in-the-middle attack;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
The CLC protocol (proposed by Tzung-Her Chen, Wei-Bin Lee and Hsing-Bai Chen, CLC, for short) is a new three-party password-authenticated key exchange (3PAKE) protocol. This CLC protocol provides a superior round efficiency (only three rounds), and its resources required for computation are relatively few. However, we find that the leakage of values V Aand VB in the CLC protocol will make a man-in-the-middle attack feasible in practice, where V Aand VB are the authentication information chosen by the server for the participants A and B . In this paper, we describe our attack on the CLC protocol and further present a modified 3PAKE protocol, which is essentially an improved CLC protocol. Our protocol can resist attacks available, including man-in-the-middle attack we mount on the initial CLC protocol. Meanwhile, we allow that the participants choose their own passwords by themselves, thus avoiding the danger that the server is controlled in the initialization phase. Also, the computational cost of our protocol is lower than that of the CLC protocol.
引用
收藏
页码:242 / 246
页数:5
相关论文
共 50 条
  • [1] Security analysis and enhancement for three-party password-based authenticated key exchange protocol
    Zhao, Jianjie
    Gu, Dawu
    Zhang, Lei
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (03) : 273 - 278
  • [2] A PRACTICAL THREE-PARTY AUTHENTICATED KEY EXCHANGE PROTOCOL
    Lo, Nai Wei
    Yeh, Kuo-Hui
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (06): : 2469 - 2483
  • [3] ON SECURITY OF A PRACTICAL THREE-PARTY KEY EXCHANGE PROTOCOL WITH ROUND EFfiCIENCY
    Lee, Cheng-Chi
    Chang, Ya-Fen
    INFORMATION TECHNOLOGY AND CONTROL, 2008, 37 (04): : 333 - 335
  • [4] Simple three-party key exchange protocol
    Lu, Rongxing
    Cao, Zhenfu
    COMPUTERS & SECURITY, 2007, 26 (01) : 94 - 97
  • [5] A Note on An Enhanced Three-Party Authentication Key Exchange Protocol
    Tan, Zuowen
    ADVANCED MEASUREMENT AND TEST, PARTS 1 AND 2, 2010, 439-440 : 1367 - 1372
  • [6] Improving the novel three-party encrypted key exchange protocol
    Yoon, Eun-Jun
    Yoo, Kee-Young
    COMPUTER STANDARDS & INTERFACES, 2008, 30 (05) : 309 - 314
  • [7] Three weaknesses in a simple three-party key exchange protocol
    Chung, Hao-Rung
    Ku, Wei-Chi
    INFORMATION SCIENCES, 2008, 178 (01) : 220 - 229
  • [8] Cryptanalysis of simple three-party key exchange protocol
    Guo, Hua
    Li, Zhoujun
    Mu, Yi
    Zhang, Xiyong
    COMPUTERS & SECURITY, 2008, 27 (1-2) : 16 - 21
  • [9] A Computation-Efficient Three-Party Encrypted Key Exchange Protocol
    Lee, Cheng-Chi
    Chen, Shun-Der
    Chen, Chin-Ling
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (03): : 573 - 579
  • [10] Verifiable three-party secure key exchange protocol based on eigenvalue
    Zhang Y.
    Wang Z.
    Wang Z.
    Chen H.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (12): : 149 - 154