Efficient three-party key exchange protocols with round efficiency

被引:12
作者
Youn, Taek-Young [1 ]
Kang, Eun Sook [2 ]
Lee, Changhoon [3 ]
机构
[1] Elect & Telecommun Res Inst, Cryptog Res Team, Taejon 305700, South Korea
[2] Korea Univ, Dept Math, Yeongi Gun, Chungcheongnam, South Korea
[3] Hanshin Univ, Sch Comp Engn, Osan Si, Gyeonggi Do, South Korea
关键词
Cryptanalysis; Password; Key exchange; Three-party setting; Password guessing attack;
D O I
10.1007/s11235-011-9649-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Recently, Guo et al. discovered some security flaws of the simple three-party key exchange protocol proposed by Lu and Cao, and proposed an improved protocol. Independently, Chung and Ku also showed some weaknesses of Lu and Cao's protocol, and provided an improved protocol. In this paper, we review some insecurity of Lu and Cao's protocol and analyze two improved protocols proposed by Guo et al. and Chung and Ku. Then we show that the protocols are still insecure. They are vulnerable to an adversary who performs an off-line password guessing attack. We provide a countermeasure by performing detailed analysis on the security flaws in two improved protocols. We also propose a secure three-party password-authenticated key exchange protocol which requires three rounds.
引用
收藏
页码:1367 / 1376
页数:10
相关论文
共 50 条
  • [41] Cryptanalysis of a simple three-party password-based key exchange protocol
    Yoon, Eun-Jun
    Yoo, Kee-Young
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (04) : 532 - 542
  • [42] Universally Composable Three-Party Password Authenticated Key Exchange
    Zhang, Qihui
    Hu, Xuexian
    Wei, Jianghong
    Liu, Wenfen
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 123 - 137
  • [43] High-efficient Multi-Key Exchange Protocol based on Three-party Authentication
    Tsai, Kun-Lin
    Huang, Yi-Li
    Leu, Fang-Yie
    Tan, Jiu-Soon
    Ye, MengYuan
    2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, : 487 - 492
  • [44] An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks
    Tu, Hang
    Kumar, Neeraj
    He, Debiao
    Kim, Jongsung
    Lee, Changhoon
    JOURNAL OF SUPERCOMPUTING, 2014, 70 (01) : 224 - 235
  • [45] Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols
    Gao, Fei
    Qin, Su-Juan
    Guo, Fen-Zhuo
    Wen, Qiao-Yan
    IEEE JOURNAL OF QUANTUM ELECTRONICS, 2011, 47 (05) : 630 - 635
  • [46] A Secure Three-Party Authenticated Key Exchange Protocol for Social Networks
    Sinha, Vivek Kumar
    Anand, Divya
    Alharithi, Fahd S.
    Almulihi, Ahmed H.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (03): : 6293 - 6305
  • [47] Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification
    Xie, Qi
    Dong, Na
    Tan, Xiao
    Wong, Duncan S.
    Wang, Guilin
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (03): : 231 - 237
  • [48] Password-based authenticated key exchange in the three-party setting
    Abdalla, M
    Fouque, PA
    Pointcheval, D
    PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 65 - 84
  • [49] Token-based authenticated key establishment protocols for three-party communication
    Yoon, Eun-Jun
    Yoo, Kee-Young
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 758 - +
  • [50] An Off-Line Dictionary Attack on a Simple Three-Party Key Exchange Protocol
    Nam, Junghyun
    Paik, Juryon
    Kang, Hyun-Kyu
    Kim, Ung Mo
    Won, Dongho
    IEEE COMMUNICATIONS LETTERS, 2009, 13 (03) : 205 - 207