Efficient three-party key exchange protocols with round efficiency

被引:12
作者
Youn, Taek-Young [1 ]
Kang, Eun Sook [2 ]
Lee, Changhoon [3 ]
机构
[1] Elect & Telecommun Res Inst, Cryptog Res Team, Taejon 305700, South Korea
[2] Korea Univ, Dept Math, Yeongi Gun, Chungcheongnam, South Korea
[3] Hanshin Univ, Sch Comp Engn, Osan Si, Gyeonggi Do, South Korea
关键词
Cryptanalysis; Password; Key exchange; Three-party setting; Password guessing attack;
D O I
10.1007/s11235-011-9649-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Recently, Guo et al. discovered some security flaws of the simple three-party key exchange protocol proposed by Lu and Cao, and proposed an improved protocol. Independently, Chung and Ku also showed some weaknesses of Lu and Cao's protocol, and provided an improved protocol. In this paper, we review some insecurity of Lu and Cao's protocol and analyze two improved protocols proposed by Guo et al. and Chung and Ku. Then we show that the protocols are still insecure. They are vulnerable to an adversary who performs an off-line password guessing attack. We provide a countermeasure by performing detailed analysis on the security flaws in two improved protocols. We also propose a secure three-party password-authenticated key exchange protocol which requires three rounds.
引用
收藏
页码:1367 / 1376
页数:10
相关论文
共 50 条
  • [31] On a simple three-party password-based key exchange protocol'
    Lin, Ching-Ying
    Hwang, Tzonelih
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (11) : 1520 - 1532
  • [32] Provably secure three-party password-authenticated key exchange
    Lin, CL
    Wen, HA
    Hwang, T
    Sun, HM
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (11) : 2990 - 3000
  • [33] Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols
    Nam, Junghyun
    Choo, Kim-Kwang Raymond
    Kim, Moonseong
    Paik, Juryon
    Won, Dongho
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (12): : 3244 - 3260
  • [34] A simple three-party password-based key exchange protocol
    Huang, Hui-Feng
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2009, 22 (07) : 857 - 862
  • [35] Anonymity preserving and round effective three-party authentication key exchange protocol based on chaotic maps
    Pak, Kyongsok
    Pak, Songho
    Ho, Cholman
    Pak, Myongsuk
    Hwang, Choljin
    PLOS ONE, 2019, 14 (03):
  • [36] Cryptanalysis of an Enhanced Simple Three-Party Key Exchange Protocol
    Kim, Hae-Jung
    Yoon, Eun-Jun
    SECURITY TECHNOLOGY, 2011, 259 : 167 - +
  • [37] Simple three-party password authenticated key exchange protocol
    Lo N.-W.
    Yeh K.-H.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (5) : 600 - 603
  • [38] A Note on An Enhanced Three-Party Authentication Key Exchange Protocol
    Tan, Zuowen
    ADVANCED MEASUREMENT AND TEST, PARTS 1 AND 2, 2010, 439-440 : 1367 - 1372
  • [39] Improving the novel three-party encrypted key exchange protocol
    Yoon, Eun-Jun
    Yoo, Kee-Young
    COMPUTER STANDARDS & INTERFACES, 2008, 30 (05) : 309 - 314
  • [40] Simple Three-Party Password Authenticated Key Exchange Protocol
    罗乃维
    叶国晖
    JournalofShanghaiJiaotongUniversity(Science), 2011, 16 (05) : 600 - 603