A Security Patch for a Three-Party Key Exchange Protocol

被引:0
|
作者
ZHAO Jianjie1
2.Department of Computer Science and Engineering
机构
基金
国家高技术研究发展计划(863计划);
关键词
information security; authentication; key exchange; man-in-the-middle attack;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
The CLC protocol (proposed by Tzung-Her Chen, Wei-Bin Lee and Hsing-Bai Chen, CLC, for short) is a new three-party password-authenticated key exchange (3PAKE) protocol. This CLC protocol provides a superior round efficiency (only three rounds), and its resources required for computation are relatively few. However, we find that the leakage of values V Aand VB in the CLC protocol will make a man-in-the-middle attack feasible in practice, where V Aand VB are the authentication information chosen by the server for the participants A and B . In this paper, we describe our attack on the CLC protocol and further present a modified 3PAKE protocol, which is essentially an improved CLC protocol. Our protocol can resist attacks available, including man-in-the-middle attack we mount on the initial CLC protocol. Meanwhile, we allow that the participants choose their own passwords by themselves, thus avoiding the danger that the server is controlled in the initialization phase. Also, the computational cost of our protocol is lower than that of the CLC protocol.
引用
收藏
页码:242 / 246
页数:5
相关论文
共 50 条
  • [21] A communication-efficient three-party password authenticated key exchange protocol
    Chang, Ting-Yi
    Hwang, Min-Shiang
    Yang, Wei-Pang
    INFORMATION SCIENCES, 2011, 181 (01) : 217 - 226
  • [22] Security weakness in a three-party pairing-based protocol for password authenticated key exchange
    Nam, Junghyun
    Lee, Youngsook
    Kim, Seungjoo
    Won, Dongho
    INFORMATION SCIENCES, 2007, 177 (06) : 1364 - 1375
  • [23] Cryptanalysis of a simple three-party password-based key exchange protocol
    Yoon, Eun-Jun
    Yoo, Kee-Young
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (04) : 532 - 542
  • [24] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chou, Chih-ho
    Tsai, Kuo-yu
    Wu, Tzong-chen
    Yeh, Kuo-hui
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2013, 14 (05): : 347 - 355
  • [25] On a simple three-party password-based key exchange protocol'
    Lin, Ching-Ying
    Hwang, Tzonelih
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (11) : 1520 - 1532
  • [26] A simple three-party password-based key exchange protocol
    Huang, Hui-Feng
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2009, 22 (07) : 857 - 862
  • [27] Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol
    Tso, Raylin
    JOURNAL OF SUPERCOMPUTING, 2013, 66 (02) : 863 - 874
  • [28] Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol
    Raylin Tso
    The Journal of Supercomputing, 2013, 66 : 863 - 874
  • [29] New identity-based three-party authenticated key agreement protocol with provable security
    Xiong, Hu
    Chen, Zhong
    Li, Fagen
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (02) : 927 - 932
  • [30] Efficient three-party password-based authenticated key exchange protocol
    Xu, C.-X., 1600, Univ. of Electronic Science and Technology of China (41): : 596 - 598+604