Cryptanalysis of a three-party password- based authenticated key exchange protocol using Weil pairing

被引:1
作者
He, Debiao [1 ,2 ]
Chen, Jianhua [1 ]
机构
[1] Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China
[2] Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100049, Peoples R China
基金
高等学校博士学科点专项科研基金;
关键词
key exchange protocol; password-based authentication; Weil pairing; impersonation attack; online dictionary attack;
D O I
10.1504/IJESDF.2012.049754
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Zeng et al. proposed a three-party password-based authenticated key exchange protocol, in which two users could generate a common secret key with the help of the server. Although Zeng et al. claimed that their protocol could withstand various attacks, we point out that their protocol cannot resist impersonation attacks and undetectable online dictionary attacks. The analysis shows Zeng et al.' s protocol is insecure for practical applications.
引用
收藏
页码:244 / 251
页数:8
相关论文
共 50 条
[31]   Gateway-oriented password-authenticated key exchange protocol in the standard model [J].
Wei, Fushan ;
Zhang, Zhenfeng ;
Ma, Chuangui .
JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (03) :760-768
[32]   Password-Based Authenticated Key Exchange Based on Signcryption for the Internet of Things [J].
Hoang, Van-Hoan ;
Lehtihet, Elyes ;
Ghamri-Doudane, Yacine .
2019 WIRELESS DAYS (WD), 2019,
[33]   Cryptanalysis of PiLike: An Impersonation Attack on the Lightweight Identity-Based Authenticated Key Exchange Protocol Using Bi-ISIS [J].
Hsu, Hao-Yi ;
Lin, Hsin-Yi ;
Tso, Raylin ;
Chang, Tao-Hsiang ;
Hsu, Jen-Chieh .
2024 19TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY, ASIAJCIS 2024, 2024, :9-16
[34]   An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client–Client Networks [J].
Mohammad Heydari ;
S. Mohammad Sajad Sadough ;
Mohammad Sabzinejad Farash ;
Shehzad Ashraf Chaudhry ;
Khalid Mahmood .
Wireless Personal Communications, 2016, 88 :337-356
[35]   Cryptanalysis of a Key Exchange Protocol Based on Commuting Matrices [J].
Jia Jianwei ;
Liu Jinhui ;
Zhang Huanguo .
CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (05) :947-951
[36]   Cryptanalysis of a Key Exchange Protocol Based on Commuting Matrices [J].
JIA Jianwei ;
LIU Jinhui ;
ZHANG Huanguo .
Chinese Journal of Electronics, 2017, 26 (05) :947-951
[37]   Integration of OWL Password-Authenticated Key Exchange Protocol to Enhance IoT Application Protocols [J].
Julio, Yair Rivera ;
Mangones, Angel Pinto ;
Tovio, Juan Torres ;
Gomez-Alvarez, Maria Clara ;
Salcedo, Dixon .
SENSORS, 2025, 25 (08)
[38]   Anonymous Password Based Authenticated Key Exchange with Sub-Linear Communication [J].
Lin, Hsiao-Ying ;
Tzeng, Wen-Guey .
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2009, 25 (03) :907-920
[39]   Three-party encrypted key exchange without server public-keys [J].
Lin, CL ;
Sun, HM ;
Steiner, M ;
Hwang, T .
IEEE COMMUNICATIONS LETTERS, 2001, 5 (12) :497-499
[40]   An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client-Client Networks [J].
Heydari, Mohammad ;
Sadough, S. Mohammad Sajad ;
Farash, Mohammad Sabzinejad ;
Chaudhry, Shehzad Ashraf ;
Mahmood, Khalid .
WIRELESS PERSONAL COMMUNICATIONS, 2016, 88 (02) :337-356