Cryptanalysis of the Dragonfly key exchange protocol

被引:12
作者
Clarke, Dylan [1 ]
Hao, Feng [1 ]
机构
[1] Newcastle Univ, Sch Comp Sci, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
基金
英国工程与自然科学研究理事会;
关键词
SECURE;
D O I
10.1049/iet-ifs.2013.0081
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dragonfly is a password authenticated key exchange protocol that has been submitted to the Internet engineering task force as a candidate standard for general internet use. The authors analysed the security of this protocol and devised an attack that is capable of extracting both the session key and password from an honest party. This attack was then implemented and experiments were performed to determine the time-scale required to successfully complete the attack.
引用
收藏
页码:283 / 289
页数:7
相关论文
共 25 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]  
[Anonymous], 1995, SELECTED AREAS CRYPT
[3]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[4]  
Bellovin S. M., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P72, DOI 10.1109/RISP.1992.213269
[5]  
Bellovin S.M., 1993, CCS 93, P244
[6]  
Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156
[7]  
Canetti R., 2005, INT C THEOR APPL CRY
[8]  
Canetti R., 2002, INT C THEOR APPL CRY
[9]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[10]  
Feng Hao, 2012, Applied Cryptography and Network Security. Proceedings 10th International Conference, ACNS 2012, P1, DOI 10.1007/978-3-642-31284-7_1