A Security Patch for a Three-Party Key Exchange Protocol

被引:0
|
作者
ZHAO Jianjie1
2.Department of Computer Science and Engineering
机构
基金
国家高技术研究发展计划(863计划);
关键词
information security; authentication; key exchange; man-in-the-middle attack;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
The CLC protocol (proposed by Tzung-Her Chen, Wei-Bin Lee and Hsing-Bai Chen, CLC, for short) is a new three-party password-authenticated key exchange (3PAKE) protocol. This CLC protocol provides a superior round efficiency (only three rounds), and its resources required for computation are relatively few. However, we find that the leakage of values V Aand VB in the CLC protocol will make a man-in-the-middle attack feasible in practice, where V Aand VB are the authentication information chosen by the server for the participants A and B . In this paper, we describe our attack on the CLC protocol and further present a modified 3PAKE protocol, which is essentially an improved CLC protocol. Our protocol can resist attacks available, including man-in-the-middle attack we mount on the initial CLC protocol. Meanwhile, we allow that the participants choose their own passwords by themselves, thus avoiding the danger that the server is controlled in the initialization phase. Also, the computational cost of our protocol is lower than that of the CLC protocol.
引用
收藏
页码:242 / 246
页数:5
相关论文
共 50 条
  • [31] Strongly password-based three-party authenticated key exchange protocol
    Lin, Yuanhui
    Hou, Mengbo
    Xu, Qiuliang
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 555 - 558
  • [32] An novel three-party authenticated key exchange protocol using one-time key
    Lv, Chao
    Ma, Maode
    Li, Hui
    Ma, Jianfeng
    Zhang, Yaoyu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 498 - 503
  • [33] A Three-Party Dynamic Identity-Based Authenticated Key Exchange Protocol with Forward Anonymity
    Hongfeng Zhu
    Shuai Geng
    Wireless Personal Communications, 2019, 109 : 1911 - 1924
  • [34] A Three-Party Dynamic Identity-Based Authenticated Key Exchange Protocol with Forward Anonymity
    Zhu, Hongfeng
    Geng, Shuai
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (03) : 1911 - 1924
  • [35] Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks
    Chen, Hsing-Bai
    Chen, Tzung-Her
    Lee, Wei-Bin
    Chang, Chin-Chen
    COMPUTER STANDARDS & INTERFACES, 2008, 30 (1-2) : 95 - 99
  • [36] A round- and computation-efficient three-party authenticated key exchange protocol
    Chen, Tzung-Her
    Lee, Wei-Bin
    Chen, Hsing-Bai
    JOURNAL OF SYSTEMS AND SOFTWARE, 2008, 81 (09) : 1581 - 1590
  • [37] An improvement on a three-party authentication key exchange protocol using elliptic curve cryptography
    Tan, Zuowen
    Journal of Convergence Information Technology, 2010, 5 (04)
  • [38] Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification
    Xie, Qi
    Dong, Na
    Tan, Xiao
    Wong, Duncan S.
    Wang, Guilin
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (03): : 231 - 237
  • [39] Cryptanalysis and Design of a Three-Party Authenticated Key Exchange Protocol Using Smart Card
    Ruhul Amin
    G. P. Biswas
    Arabian Journal for Science and Engineering, 2015, 40 : 3135 - 3149
  • [40] Efficient three-party authenticated key agreement protocol in certificateless cryptography
    Xiong, Hu
    Chen, Zhong
    Qin, Zhiguang
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2011, 88 (13) : 2707 - 2716