Cryptanalysis and Design of a Three-Party Authenticated Key Exchange Protocol Using Smart Card

被引:28
|
作者
Amin, Ruhul [1 ]
Biswas, G. P. [1 ]
机构
[1] Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad 826004, Bihar, India
关键词
3PAKE; Authentication; Smart card; Security attacks; REMOTE USER AUTHENTICATION; SECURE; SCHEME;
D O I
10.1007/s13369-015-1743-5
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Three-party authenticated key exchange protocol (3PAKE) is used to provide security protection on the transmitted data over the insecure communication by performing session key agreement between the entities involved. Comparing with the 2PAKE protocol, 3PAKE protocol is more suitable for managing unrestricted number of users. Recently, several researchers have proposed many 3PAKE protocols using smart card. However, we have scrutinized carefully recently published Yang et al.'s protocol, and it has been observed that the same protocol suffers from several security weaknesses such as insider attack, off-line password guessing attack, many logged-in users' attack and replay attack. Moreover, we have justified a serious security issue of the password change phase of the same scheme. In order to fix the above-mentioned shortcomings, this paper proposes an efficient 3PAKE protocol using smart card based on the cryptographic one-way hash function. The formal security analysis proves that proposed protocol provides strong security protection on the relevant security attacks including the above-mentioned security weaknesses. Moreover, the simulation results of the proposed scheme using AVISPA tool show that the same protocol is SAFE under OFMC and CL-AtSe models. The performance comparisons are also made, which ensure that the protocol is relatively better than the existing related schemes. To the best of our knowledge, the proposed scheme should be implemented in practical application, as it provides well security protection on the relevant security attacks, provides relatively better complexities than the existing schemes, achieves proper mutual authentication along with user-friendly password change phase.
引用
收藏
页码:3135 / 3149
页数:15
相关论文
共 50 条
  • [31] Efficient three-party authenticated key agreement protocol in certificateless cryptography
    Xiong, Hu
    Chen, Zhong
    Qin, Zhiguang
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2011, 88 (13) : 2707 - 2716
  • [32] Comment on “A practical protocol for three-party authenticated quantum key distribution”
    Yi-Ping Luo
    Wen-Han Chou
    Tzonelih Hwang
    Quantum Information Processing, 2017, 16
  • [33] Provably secure three-party password-authenticated key exchange
    Lin, CL
    Wen, HA
    Hwang, T
    Sun, HM
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (11) : 2990 - 3000
  • [34] A Three-Party Dynamic Identity-Based Authenticated Key Exchange Protocol with Forward Anonymity
    Hongfeng Zhu
    Shuai Geng
    Wireless Personal Communications, 2019, 109 : 1911 - 1924
  • [35] A Three-Party Dynamic Identity-Based Authenticated Key Exchange Protocol with Forward Anonymity
    Zhu, Hongfeng
    Geng, Shuai
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (03) : 1911 - 1924
  • [36] Comment on "A practical protocol for three-party authenticated quantum key distribution"
    Luo, Yi-Ping
    Chou, Wen-Han
    Hwang, Tzonelih
    QUANTUM INFORMATION PROCESSING, 2017, 16 (05)
  • [37] A Security Patch for a Three-Party Key Exchange Protocol
    ZHAO Jianjie1
    2.Department of Computer Science and Engineering
    WuhanUniversityJournalofNaturalSciences, 2010, 15 (03) : 242 - 246
  • [38] Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
    Xiong Li
    Jianwei Niu
    Saru Kumari
    Muhammad Khurram Khan
    Junguo Liao
    Wei Liang
    Nonlinear Dynamics, 2015, 80 : 1209 - 1220
  • [39] Design and Analysis of a Security-Enhanced Three-Party Authenticated Key Agreement Protocol Based on Chaotic Maps
    Zheng, Yilong
    Hu, Shunfang
    Wei, Liangxiong
    Chen, Yanru
    Wang, Hao
    Yang, Yanbing
    Li, Yang
    Xu, Bingjie
    Huang, Wei
    Chen, Liangyin
    IEEE ACCESS, 2020, 8 : 66150 - 66162
  • [40] Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords
    Xie Qi
    Hu Bin
    Chen Ke-Fei
    Liu Wen-Hao
    Tan Xiao
    CHINESE PHYSICS B, 2015, 24 (11)