Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols

被引:10
|
作者
Nam, Junghyun [1 ]
Choo, Kim-Kwang Raymond [2 ]
Kim, Moonseong [3 ]
Paik, Juryon [4 ]
Won, Dongho [4 ]
机构
[1] Konkuk Univ, Dept Comp Engn, Seoul, South Korea
[2] Univ S Australia, Adv Comp Res Ctr, Informat Assurance Res Grp, Adelaide, SA 5001, Australia
[3] Korean Intellectual Property Off, Informat & Commun Examinat Bur, Taejon, South Korea
[4] Sungkyunkwan Univ, Dept Comp Engn, Seoul, South Korea
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2013年 / 7卷 / 12期
基金
新加坡国家研究基金会;
关键词
Password-based authenticated key exchange (PAKE); three-party key exchange; password security; offline dictionary attack; undetectable online dictionary attack; SECURITY; CRYPTANALYSIS; PROOFS;
D O I
10.3837/tiis.2013.12.016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A three-party password-based authenticated key exchange (PAKE) protocol allows two clients registered with a trusted server to generate a common cryptographic key from their individual passwords shared only with the server. A key requirement for three-party PAKE protocols is to prevent an adversary from mounting a dictionary attack. This requirement must be met even when the adversary is a malicious (registered) client who can set up normal protocol sessions with other clients. This work revisits three existing three-party PAKE protocols, namely, Guo et al.'s (2008) protocol, Huang's (2009) protocol, and Lee and Hwang's (2010) protocol, and demonstrates that these protocols are not secure against offline and/or (undetectable) online dictionary attacks in the presence of a malicious client. The offline dictionary attack we present against Guo et al.'s protocol also applies to other similar protocols including Lee and Hwang's protocol. We conclude with some suggestions on how to design a three-party PAKE protocol that is resistant against dictionary attacks
引用
收藏
页码:3244 / 3260
页数:17
相关论文
共 50 条
  • [41] Untraceable biometric-based three-party authenticated key exchange for dynamic systems
    Ngoc-Tu Nguyen
    Chang, Chin-Chen
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (03) : 644 - 663
  • [42] Cryptanalysis of two three-party encrypted key exchange protocols
    Lo, N. W.
    Yeh, Kuo-Hui
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1167 - 1174
  • [43] Chaotic maps-based three-party password-authenticated key agreement scheme
    Xie, Qi
    Zhao, Jianmin
    Yu, Xiuyuan
    NONLINEAR DYNAMICS, 2013, 74 (04) : 1021 - 1027
  • [44] Anonymous Three-Party Password-Authenticated Key Exchange Scheme for Telecare Medical Information Systems
    Xie, Qi
    Hu, Bin
    Dong, Na
    Wong, Duncan S.
    PLOS ONE, 2014, 9 (07):
  • [45] An Efficient Password Security of Three-Party Key Exchange Protocol based on ECDLP
    Kar, Jayaprakash
    Majhi, Banshidhar
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2009, 3 (04): : 25 - 32
  • [46] Cross-Domain Password-Based Authenticated Key Exchange Revisited
    Chen, Liqun
    Lim, Hoon Wei
    Yang, Guomin
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2014, 16 (04)
  • [47] Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol Resistant to Password Guessing Attacks
    Chien, Hung-Yu
    Wu, Tzong-Chen
    Yeh, Ming-Kuei
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2013, 29 (02) : 249 - 265
  • [48] Cross-Domain Password-Based Authenticated Key Exchange Revisited
    Chen, Liqun
    Lim, Hoon Wei
    Yang, Guomin
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 1052 - 1060
  • [49] A Secure Three-Party Authenticated Key Exchange Protocol for Social Networks
    Sinha, Vivek Kumar
    Anand, Divya
    Alharithi, Fahd S.
    Almulihi, Ahmed H.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (03): : 6293 - 6305
  • [50] Efficient and secure password-based authentication protocols against guessing attacks
    Kwon, T
    Song, J
    COMPUTER COMMUNICATIONS, 1998, 21 (09) : 853 - 861