Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols

被引:10
|
作者
Nam, Junghyun [1 ]
Choo, Kim-Kwang Raymond [2 ]
Kim, Moonseong [3 ]
Paik, Juryon [4 ]
Won, Dongho [4 ]
机构
[1] Konkuk Univ, Dept Comp Engn, Seoul, South Korea
[2] Univ S Australia, Adv Comp Res Ctr, Informat Assurance Res Grp, Adelaide, SA 5001, Australia
[3] Korean Intellectual Property Off, Informat & Commun Examinat Bur, Taejon, South Korea
[4] Sungkyunkwan Univ, Dept Comp Engn, Seoul, South Korea
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2013年 / 7卷 / 12期
基金
新加坡国家研究基金会;
关键词
Password-based authenticated key exchange (PAKE); three-party key exchange; password security; offline dictionary attack; undetectable online dictionary attack; SECURITY; CRYPTANALYSIS; PROOFS;
D O I
10.3837/tiis.2013.12.016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A three-party password-based authenticated key exchange (PAKE) protocol allows two clients registered with a trusted server to generate a common cryptographic key from their individual passwords shared only with the server. A key requirement for three-party PAKE protocols is to prevent an adversary from mounting a dictionary attack. This requirement must be met even when the adversary is a malicious (registered) client who can set up normal protocol sessions with other clients. This work revisits three existing three-party PAKE protocols, namely, Guo et al.'s (2008) protocol, Huang's (2009) protocol, and Lee and Hwang's (2010) protocol, and demonstrates that these protocols are not secure against offline and/or (undetectable) online dictionary attacks in the presence of a malicious client. The offline dictionary attack we present against Guo et al.'s protocol also applies to other similar protocols including Lee and Hwang's protocol. We conclude with some suggestions on how to design a three-party PAKE protocol that is resistant against dictionary attacks
引用
收藏
页码:3244 / 3260
页数:17
相关论文
共 50 条
  • [21] Security Analysis and Enhancements of Verifier-Based Password-Authenticated Key Exchange Protocols in the Three-Party Setting
    Wu, Shuhua
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (03) : 1059 - 1072
  • [22] Provably Secure Password-based Three-party Key Exchange Protocol with Computation Efficiency
    Fu, Jih-Ming
    Lin, Jeng-Ping
    Wang, Ren-Chiun
    LIFE SCIENCE JOURNAL-ACTA ZHENGZHOU UNIVERSITY OVERSEAS EDITION, 2011, 8 (04): : 635 - 643
  • [23] Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys
    Xiong, Hu
    Chen, Yanan
    Guan, Zhi
    Chen, Zhong
    INFORMATION SCIENCES, 2013, 235 : 329 - 340
  • [24] Cryptanalysis of Guo et al.'s three-party password-based authenticated key exchange (G-3PAKE) protocol
    Choi, Sung-Bae
    Yoon, Eun-Jun
    INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING 2011, 2011, 24 : 187 - 191
  • [25] An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party Setting
    Nam, Junghyun
    Choo, Kim-Kwang Raymond
    Paik, Juryon
    Won, Dongho
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (01) : 424 - 427
  • [26] Security issues of a Three-Party Password Authenticated Key Exchange Protocol Resistant to Stolen Smart Card Attacks
    Nag, Soumyajit
    Banerjee, Subhasish
    2018 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS, MATERIALS ENGINEERING & NANO-TECHNOLOGY (IEMENTECH), 2018, : 347 - 351
  • [27] Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting
    Nam, Junghyun
    Choo, Kim-Kwang Raymond
    Han, Sangchul
    Paik, Juryon
    Won, Dongho
    SYMMETRY-BASEL, 2015, 7 (01): : 105 - 124
  • [28] A PRACTICAL THREE-PARTY AUTHENTICATED KEY EXCHANGE PROTOCOL
    Lo, Nai Wei
    Yeh, Kuo-Hui
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (06): : 2469 - 2483
  • [29] Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model
    Nam, Junghyun
    Choo, Kim-Kwang Raymond
    Kim, Junghwan
    Kang, Hyun-Kyu
    Kim, Jinsoo
    Paik, Juryon
    Won, Dongho
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [30] Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps
    Islam, S. K. Hafizul
    INFORMATION SCIENCES, 2015, 312 : 104 - 130