Cryptanalysis and Design of a Three-Party Authenticated Key Exchange Protocol Using Smart Card

被引:28
|
作者
Amin, Ruhul [1 ]
Biswas, G. P. [1 ]
机构
[1] Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad 826004, Bihar, India
关键词
3PAKE; Authentication; Smart card; Security attacks; REMOTE USER AUTHENTICATION; SECURE; SCHEME;
D O I
10.1007/s13369-015-1743-5
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Three-party authenticated key exchange protocol (3PAKE) is used to provide security protection on the transmitted data over the insecure communication by performing session key agreement between the entities involved. Comparing with the 2PAKE protocol, 3PAKE protocol is more suitable for managing unrestricted number of users. Recently, several researchers have proposed many 3PAKE protocols using smart card. However, we have scrutinized carefully recently published Yang et al.'s protocol, and it has been observed that the same protocol suffers from several security weaknesses such as insider attack, off-line password guessing attack, many logged-in users' attack and replay attack. Moreover, we have justified a serious security issue of the password change phase of the same scheme. In order to fix the above-mentioned shortcomings, this paper proposes an efficient 3PAKE protocol using smart card based on the cryptographic one-way hash function. The formal security analysis proves that proposed protocol provides strong security protection on the relevant security attacks including the above-mentioned security weaknesses. Moreover, the simulation results of the proposed scheme using AVISPA tool show that the same protocol is SAFE under OFMC and CL-AtSe models. The performance comparisons are also made, which ensure that the protocol is relatively better than the existing related schemes. To the best of our knowledge, the proposed scheme should be implemented in practical application, as it provides well security protection on the relevant security attacks, provides relatively better complexities than the existing schemes, achieves proper mutual authentication along with user-friendly password change phase.
引用
收藏
页码:3135 / 3149
页数:15
相关论文
共 50 条
  • [21] Security analysis and enhancement for three-party password-based authenticated key exchange protocol
    Zhao, Jianjie
    Gu, Dawu
    Zhang, Lei
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (03) : 273 - 278
  • [22] A Smart Card-Based Three-Party Quantum Key Distribution Protocol
    Wijayantol, Heri
    Chen, Hsing-Chung
    Lin, Wen Yen
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 291 - 301
  • [23] A round- and computation-efficient three-party authenticated key exchange protocol
    Chen, Tzung-Her
    Lee, Wei-Bin
    Chen, Hsing-Bai
    JOURNAL OF SYSTEMS AND SOFTWARE, 2008, 81 (09) : 1581 - 1590
  • [24] Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
    Li, Xiong
    Niu, Jianwei
    Kumari, Saru
    Khan, Muhammad Khurram
    Liao, Junguo
    Liang, Wei
    NONLINEAR DYNAMICS, 2015, 80 (03) : 1209 - 1220
  • [25] Cryptanalysis of two three-party encrypted key exchange protocols
    Lo, N. W.
    Yeh, Kuo-Hui
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1167 - 1174
  • [26] Efficient three-party key exchange using smart cards
    Jaung, WS
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 619 - 624
  • [27] Universally Composable Three-Party Password Authenticated Key Exchange
    Zhang, Qihui
    Hu, Xuexian
    Wei, Jianghong
    Liu, Wenfen
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 123 - 137
  • [28] Re-attack on a three-party password-based authenticated key exchange protocol
    Liang, Haiquan
    Hu, Jingtai
    Wu, Shuhua
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (5-6) : 1175 - 1183
  • [29] Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al.
    Jiang, Qi
    Ma, Jianfeng
    Tian, Youliang
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (07) : 1340 - 1351
  • [30] Three-Party Password-Based Authenticated Key Exchange Protocol Based on Bilinear Pairings
    Wei, Fushan
    Ma, Chuangui
    Cheng, Qingfeng
    INFORMATION COMPUTING AND APPLICATIONS, 2010, 6377 : 135 - 142