A Password-based Key Establishment Protocol with Symmetric Key Cryptography

被引:1
|
作者
Erguler, Imran [1 ]
Anarim, Emin [2 ]
机构
[1] TUBITAK UEKAE Gebze, Natl Res Inst Elect & Cryptol, Kocaeli, Turkey
[2] Bogazici Univ, Elect Elect Engn Dept, Istanbul, Turkey
来源
2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB) | 2008年
关键词
D O I
10.1109/WiMob.2008.112
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In 2005, Laih, Ding and Huang proposed a password-based key establishment protocol such that a user and a server can authenticate each other and generate a strong session key by their shared weak password within a symmetric cipher in an insecure channel. In this protocol, a special function which is a combination of a picture function and a distortion function e. g. CAPTCHA, is combined to authenticate the user and protect the password from the dictionary attacks that are major threats for most of the weak password-based protocols. They claim that the proposed protocol is secure against some well known attacks. However Tang and Mitchell show that the protocol suffers from an offline dictionary attack requiring a machine-based search of size 2(23) which takes only about 2.3 hours. So designing such a protocol with providing practical security against offline attack is still an open problem. In this study, we introduce two password-based authenticated key establishment protocols that provide practical security against offline dictionary attacks by only using symmetric key cryptography.
引用
收藏
页码:543 / 548
页数:6
相关论文
共 50 条
  • [1] A Password-based Key Establishment Protocol with Symmetric Key Cryptography
    Ergueler, Imran
    Anarim, Emin
    2008 IEEE 16TH SIGNAL PROCESSING, COMMUNICATION AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2008, : 395 - 399
  • [2] Large Key Sizes and the Security of Password-Based Cryptography
    Boklan, Kent D.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2009, 3 (01) : 65 - 72
  • [3] On Security of Key Derivation Functions in Password-based Cryptography
    Kodwani, Gaurav
    Arora, Shashank
    Atrey, Pradeep K.
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 109 - 114
  • [4] Password-only authenticated key establishment protocol without public key cryptography
    Laih, CS
    Ding, L
    Huang, YM
    ELECTRONICS LETTERS, 2005, 41 (04) : 185 - 186
  • [5] Password-based independent authentication and key exchange protocol
    Jung, KS
    Kim, JY
    Chung, TC
    ICICS-PCM 2003, VOLS 1-3, PROCEEDINGS, 2003, : 1908 - 1912
  • [6] A Simple Password-based Authenticated Key Agreement Protocol
    Lee, Yung-Cheng
    OPTICAL, ELECTRONIC MATERIALS AND APPLICATIONS, PTS 1-2, 2011, 216 : 510 - 513
  • [7] Efficient password-based authenticated key agreement protocol
    Lee, SW
    Kim, WH
    Kim, HS
    Yoo, KY
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 617 - 626
  • [8] Practical password-based authenticated key exchange protocol
    Wu, Shuhua
    Zhu, Yuefei
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 523 - 533
  • [9] Cryptanalysis and improvement of a password-based key exchange protocol
    Liu, Feng-Mei
    Luo, Shi-Xin
    Ren, Chuan-Lun
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3668 - +
  • [10] Secure Key Establishment Protocol for Smart Homes Based on Symmetric Cryptography
    Thammarat, Chalee
    Techapanupreeda, Chian
    36TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2022), 2022, : 46 - 51