Cryptanalysis and Design of a Three-Party Authenticated Key Exchange Protocol Using Smart Card

被引:28
作者
Amin, Ruhul [1 ]
Biswas, G. P. [1 ]
机构
[1] Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad 826004, Bihar, India
关键词
3PAKE; Authentication; Smart card; Security attacks; REMOTE USER AUTHENTICATION; SECURE; SCHEME;
D O I
10.1007/s13369-015-1743-5
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Three-party authenticated key exchange protocol (3PAKE) is used to provide security protection on the transmitted data over the insecure communication by performing session key agreement between the entities involved. Comparing with the 2PAKE protocol, 3PAKE protocol is more suitable for managing unrestricted number of users. Recently, several researchers have proposed many 3PAKE protocols using smart card. However, we have scrutinized carefully recently published Yang et al.'s protocol, and it has been observed that the same protocol suffers from several security weaknesses such as insider attack, off-line password guessing attack, many logged-in users' attack and replay attack. Moreover, we have justified a serious security issue of the password change phase of the same scheme. In order to fix the above-mentioned shortcomings, this paper proposes an efficient 3PAKE protocol using smart card based on the cryptographic one-way hash function. The formal security analysis proves that proposed protocol provides strong security protection on the relevant security attacks including the above-mentioned security weaknesses. Moreover, the simulation results of the proposed scheme using AVISPA tool show that the same protocol is SAFE under OFMC and CL-AtSe models. The performance comparisons are also made, which ensure that the protocol is relatively better than the existing related schemes. To the best of our knowledge, the proposed scheme should be implemented in practical application, as it provides well security protection on the relevant security attacks, provides relatively better complexities than the existing schemes, achieves proper mutual authentication along with user-friendly password change phase.
引用
收藏
页码:3135 / 3149
页数:15
相关论文
共 47 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]  
Amin R, 2015, 2015 THIRD INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT)
[3]   Design and Analysis of Bilinear Pairing Based Mutual Authentication and Key Agreement Protocol Usable in Multi-server Environment [J].
Amin, Ruhul ;
Biswas, G. P. .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (01) :439-462
[4]   An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS [J].
Amin, Ruhul ;
Biswas, G. P. .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (08)
[5]   A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity [J].
Amin, Ruhul ;
Biswas, G. P. .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (08)
[6]   Remote Access Control Mechanism Using Rabin Public Key Cryptosystem [J].
Amin, Ruhul ;
Biswas, G. P. .
INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1, 2015, 339 :525-533
[7]  
[Anonymous], 2013, INT J COMPUTER APPL
[8]  
BELLOVIN SM, 1992, 1992 IEEE COMPUTER SOCIETY SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY : PROCEEDINGS, P72
[9]  
Chang C., 2008, P 2 INTERNATIONALCON, P329
[10]   A communication-efficient three-party password authenticated key exchange protocol [J].
Chang, Ting-Yi ;
Hwang, Min-Shiang ;
Yang, Wei-Pang .
INFORMATION SCIENCES, 2011, 181 (01) :217-226