PDM: A new strong password-based protocol

被引:0
作者
Kaufman, C
Perlman, R
机构
来源
USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM | 2001年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we present PDM (Password Derived Moduli), a new approach to strong password-based protocols usable either for mutual authentication or for downloading security information such as the user's private key. We describe how the properties desirable for strong password mutual authentication differ from the properties desirable for credentials download, In particular, a protocol used solely for credentials download can be simpler and less expensive than one used for mutual authentication since some properties (such as authentication of the server) are not necessary for credentials download. The features necessary for mutual authentication can be easily added to a credentials download protocol, but many of the protocols designed for mutual authentication are not as desirable for use in credentials download as protocols like PDM and basic EKE and SPEKE because they are unnecessarily expensive when used for that purpose, PDM's performance is vastly more expensive at the client than any of the protocols in the literature, but it is more efficient at the server. We claim that performance at the server, since a server must handle a large and potentially unpredictable number of clients, is more important than performance at the client, assuming that client performance is "good enough". We describe PDM for credentials download, and then show how to enhance it to have the proper-ties desirable for mutual authentication. In particular, the enhancement we advocate for allowing PDM to avoid storing a password-equivalent at the server is less expensive than existing schemes, and our approach can be used as a more efficient (at the server) variant of augmented EKE and SPEKE than the currently published schemes. PDM is important because it is a very different approach to the problem than any in the literature, we believe it to be unencumbered by patents, and because it can be a lot less expensive at the server than existing schemes.
引用
收藏
页码:313 / 321
页数:9
相关论文
共 50 条
[31]   Security analysis of a password-based authentication protocol proposed to IEEE 1363 [J].
Zhao, Z ;
Dong, ZQ ;
Wang, YG .
THEORETICAL COMPUTER SCIENCE, 2006, 352 (1-3) :280-287
[32]   A simple three-party password-based key exchange protocol [J].
Huang, Hui-Feng .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2009, 22 (07) :857-862
[33]   On a simple three-party password-based key exchange protocol' [J].
Lin, Ching-Ying ;
Hwang, Tzonelih .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (11) :1520-1532
[34]   Universally Composable Three Party Password-based Key Exchange Protocol [J].
Deng Miaolei ;
Ma Jianfeng ;
Le Fulong .
CHINA COMMUNICATIONS, 2009, 6 (03) :150-155
[35]   An Enhanced Password-based Group Key Agreement Protocol with Constant Rounds [J].
Yuan, Wei ;
Hu, Liang .
APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (05) :2589-2594
[36]   Password-based encryption analyzed [J].
Abadi, M ;
Warinschi, B .
AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2005, 3580 :664-676
[37]   Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation [J].
Kikuchi, Ryo ;
Chida, Koji ;
Ikarashi, Dai ;
Hamada, Koki .
CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 :179-196
[38]   Comments on password-based private key download protocol of NDSS'99 [J].
Kim, S ;
Kim, B ;
Park, S .
ELECTRONICS LETTERS, 1999, 35 (22) :1937-1938
[39]   Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework [J].
Hu, Xuexian ;
Liu, Wenfen .
INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 :144-153
[40]   A Four-Party Password-based Authentication Key Exchange Protocol [J].
Liu, Xiumei ;
Liu, Junjiang ;
Chang, Guiran .
2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC), 2012, :280-283