Cryptanalysis of a three-party password- based authenticated key exchange protocol using Weil pairing

被引:1
作者
He, Debiao [1 ,2 ]
Chen, Jianhua [1 ]
机构
[1] Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China
[2] Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100049, Peoples R China
基金
高等学校博士学科点专项科研基金;
关键词
key exchange protocol; password-based authentication; Weil pairing; impersonation attack; online dictionary attack;
D O I
10.1504/IJESDF.2012.049754
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Zeng et al. proposed a three-party password-based authenticated key exchange protocol, in which two users could generate a common secret key with the help of the server. Although Zeng et al. claimed that their protocol could withstand various attacks, we point out that their protocol cannot resist impersonation attacks and undetectable online dictionary attacks. The analysis shows Zeng et al.' s protocol is insecure for practical applications.
引用
收藏
页码:244 / 251
页数:8
相关论文
共 50 条
[21]   Cryptanalysis of Server-Aided Password-Based Authenticated Key Exchange Protocols [J].
Nam, Junghyun ;
Choo, Kim-Kwang Raymond ;
Paik, Juryon ;
Won, Dongho .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (02) :47-57
[22]   Anonymous Password Authenticated Key Exchange Protocol in the Standard Model [J].
Hu, Xuexian ;
Zhang, Jiang ;
Zhang, Zhenfeng ;
Liu, Fengmei .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) :1451-1474
[23]   Anonymous Password Authenticated Key Exchange Protocol in the Standard Model [J].
Xuexian Hu ;
Jiang Zhang ;
Zhenfeng Zhang ;
Fengmei Liu .
Wireless Personal Communications, 2017, 96 :1451-1474
[24]   Password-Based Authenticated Key Exchange: An Overview [J].
Abdalla, Michel .
PROVABLE SECURITY, PROVSEC 2014, 2014, 8782 :1-9
[25]   An Off-Line Dictionary Attack on a Simple Three-Party Key Exchange Protocol [J].
Nam, Junghyun ;
Paik, Juryon ;
Kang, Hyun-Kyu ;
Kim, Ung Mo ;
Won, Dongho .
IEEE COMMUNICATIONS LETTERS, 2009, 13 (03) :205-207
[26]   A Four-Party Password-based Authentication Key Exchange Protocol [J].
Liu, Xiumei ;
Liu, Junjiang ;
Chang, Guiran .
2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC), 2012, :280-283
[27]   Password-authenticated key exchange using efficient MACs [J].
Strangio, Maurizio A. .
JOURNAL OF COMPUTERS, 2006, 1 (08) :27-35
[28]   Secure one-round tripartite authenticated key agreement protocol from Weil pairing [J].
Lin, CH ;
Lin, HH .
AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, :135-138
[29]   Cryptanalysis of a key exchange protocol based on the ring [J].
Zhang, Yang .
APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2018, 29 (02) :103-112
[30]   Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security [J].
Wei, Fushan ;
Ma, Chuangui ;
Zhang, Zhenfeng .
PROVABLE SECURITY, 2011, 6980 :366-+