An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network

被引:0
作者
Gao, Zhigang [1 ]
Feng, Dengguo [1 ]
机构
[1] Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing 100190, Peoples R China
来源
INFORMATION SECURITY AND CRYPTOLOGY | 2010年 / 6151卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Password-based Authenticated Key Agreement (PAKA) protocols are widely used in wireless mobile networks, however many existing PAKA protocols have security flaws. In the 3GPP2 network, there are several PAKA protocols proposed to enhance the security of the Authentication Key distribution mechanism which is subjected to the Man-In-The-Middle attack. We point out the security flaws of such protocols in [10,6] and give two practical attacks on them. Moreover we propose an enhanced PAKA protocol which can resist both undetectable on-line and off-line password guessing attacks, and formally analyze its security in the random oracle model. In addition, we consider a special version of Diffie-Hellman problem called Degenerate Diffie-Hellman problem and propose two assumptions called Computational and Decisional Degenerate Diffie-Hellman assumption which are as difficult as CDEI assumption and DDH assumption respectively.
引用
收藏
页码:134 / 143
页数:10
相关论文
共 17 条
  • [1] Aboba B., EXTENSIBLE AUTHENTIC
  • [2] [Anonymous], 2005 IEEE WIR COMM N
  • [3] [Anonymous], ACM OPERATING SYSTEM
  • [4] [Anonymous], 4764 RFC INT ENG TAS
  • [5] [Anonymous], NS00110 3GPP2
  • [6] [Anonymous], 4 SKLOIS WORKSH SEC
  • [7] [Anonymous], CS0016B 3GPP2
  • [8] [Anonymous], 2005 IEEE WIR COMM N
  • [9] Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
  • [10] Bellare M, 1997, LECT NOTES COMPUT SC, V1294, P470