Secure key agreement protocols for three-party against guessing attacks

被引:64
作者
Sun, HM
Chen, BC
Hwang, T
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
关键词
cryptography; encrypted key exchange (EKE); three-party EKE; verifier-based; guessing attacks;
D O I
10.1016/j.jss.2003.11.017
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Key exchange protocol is important for sending secret messages using the session key between two parties. In order to reach the objective, the premise is to generate a session key securely. Encryption key exchange was first proposed to generate a session key with a weak authenticated password against guessing attacks. Next, another authenticated key exchange protocols for three-party, two clients who request the session key and one server who authenticates the user's identity and assist in generating a session key, were proposed. In this paper, we focus on the three-party authenticated key exchange protocol. In addition to analyzing and improving a password-based authenticated key exchange protocol, a new verified-based protocol is also proposed. (C) 2003 Elsevier Inc. All rights reserved.
引用
收藏
页码:63 / 68
页数:6
相关论文
共 15 条
[1]  
Bellovin S. M., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P72, DOI 10.1109/RISP.1992.213269
[2]  
BELLOVIN SM, 1994, AUGMENTED ENCRYTED K
[3]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[4]   PROTECTING POORLY CHOSEN SECRETS FROM GUESSING ATTACKS [J].
GONG, L ;
LOMAS, MA ;
NEEDHAM, RM ;
SALTZER, JH .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (05) :648-656
[5]  
GONG L, 1995, P 8 IEEE COMP SEC FD, P24
[6]  
JABLON D, 1997, WETICE 97 ENTERPRISE
[7]   Strong password-only authenticated key exchange [J].
Jablon, D.P. .
Computer Communication Review, 1996, 26 (05) :5-26
[8]  
Keung S., 1995, Proceedings Fourth International Conference on Computer Communications and Networks (ICCCN'95) (Cat. No.95TB8110), P105, DOI 10.1109/ICCCN.1995.540108
[9]   Secure agreement scheme for gxy via password authentication [J].
Kwon, T ;
Song, J .
ELECTRONICS LETTERS, 1999, 35 (11) :892-893
[10]  
Kwon T, 1998, IEICE T FUND ELECTR, VE81A, P156