PDM: A new strong password-based protocol

被引:0
作者
Kaufman, C
Perlman, R
机构
来源
USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM | 2001年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we present PDM (Password Derived Moduli), a new approach to strong password-based protocols usable either for mutual authentication or for downloading security information such as the user's private key. We describe how the properties desirable for strong password mutual authentication differ from the properties desirable for credentials download, In particular, a protocol used solely for credentials download can be simpler and less expensive than one used for mutual authentication since some properties (such as authentication of the server) are not necessary for credentials download. The features necessary for mutual authentication can be easily added to a credentials download protocol, but many of the protocols designed for mutual authentication are not as desirable for use in credentials download as protocols like PDM and basic EKE and SPEKE because they are unnecessarily expensive when used for that purpose, PDM's performance is vastly more expensive at the client than any of the protocols in the literature, but it is more efficient at the server. We claim that performance at the server, since a server must handle a large and potentially unpredictable number of clients, is more important than performance at the client, assuming that client performance is "good enough". We describe PDM for credentials download, and then show how to enhance it to have the proper-ties desirable for mutual authentication. In particular, the enhancement we advocate for allowing PDM to avoid storing a password-equivalent at the server is less expensive than existing schemes, and our approach can be used as a more efficient (at the server) variant of augmented EKE and SPEKE than the currently published schemes. PDM is important because it is a very different approach to the problem than any in the literature, we believe it to be unencumbered by patents, and because it can be a lot less expensive at the server than existing schemes.
引用
收藏
页码:313 / 321
页数:9
相关论文
共 50 条
[41]   A Secure Anonymous Password-based Authentication Protocol with Control of Authentication Numbers [J].
Shin, SeongHan ;
Kobara, Kazukuni .
PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, :325-329
[42]   Efficient and provably secure password-based group key agreement protocol [J].
Zheng, Ming-Hui ;
Zhou, Hui-Hua ;
Li, Jun ;
Cui, Guo-Hua .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) :948-953
[43]   Comments on password-based private key download protocol of NDSS'99 [J].
KISA, Dong-A Tower, 1321-6, Seocho-Dong, Seacho-Gu, Seoul 137-070, Korea, Republic of .
Electron. Lett., 22 (1937-1938)
[44]   Password-based key authentication model - A new approach [J].
Ibrahim, Yasir Khalil .
IMECS 2007: International Multiconference of Engineers and Computer Scientists, Vols I and II, 2007, :2388-2390
[45]   Composition of password-based protocols [J].
Chevalier, Celine ;
Delaune, Stephanie ;
Kremer, Steve ;
Ryan, Mark D. .
FORMAL METHODS IN SYSTEM DESIGN, 2013, 43 (03) :369-413
[46]   Universally Composable Three Party Password-based Key Exchange Protocol [J].
Deng Miaolei Ma Jianfeng Le Fulong School of ComputerXidian UniversityXian China Institute of ScienceInformation Engineering UniversityZhengzhou China .
中国通信, 2009, 6 (03) :150-155
[47]   A scalable password-based group key exchange protocol in the standard model [J].
Abdalla, Michel ;
Pointcheval, David .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2006, 2006, 4284 :332-347
[48]   Composition of password-based protocols [J].
Delaune, Stephanie ;
Kremer, Steve ;
Ryan, Mark .
CSF 2008: 21ST IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, PROCEEDINGS, 2008, :239-+
[49]   Composition of password-based protocols [J].
Céline Chevalier ;
Stéphanie Delaune ;
Steve Kremer ;
Mark D. Ryan .
Formal Methods in System Design, 2013, 43 :369-413
[50]   Securing Password in Static Password-based Authentication: A Review [J].
Mohamedali, Intisar A. ;
Fadlalla, Yahia .
PROCEEDINGS OF 2017 SUDAN CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (SCCSIT), 2017, :98-102