Cryptanalysis and amendment of authenticated key exchange protocol for mobile devices

被引:0
|
作者
Pursharthi, Komal [1 ]
Mishra, Dheerendra [1 ]
机构
[1] Maulana Azad Natl Inst Technol, Dept Math Bioinformat & Comp Applicat, Bhopal 462003, India
关键词
Authenticated key exchange; Ring learning with error; Post quantum security; Secure mobile communication; SCHEME; SECURE;
D O I
10.1007/s12083-025-01937-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent innovations in wireless technologies have led to a surge in the popularity of mobile applications, enabling users to access various web services via their mobile devices at any time and from any location. As a result, ensuring security in wireless communications has become paramount due to the inherently public nature of the communication channel. In the past twenty years, cryptographers have introduced numerous authentication schemes tailored for mobile devices to assure secure communication, typically following either a two-party or three-party scenario. However, many of these schemes rely on discrete log (DLP) or factorization (IF) number-theoretic hard problems, which can be efficiently solved using Shor's algorithm on a highly scalable quantum computer. Consequently, authenticated key exchange (AKE) protocols constructed on these mathematical problems are considered insecure in post-quantum environments. Thus, there is a pressing need to analyze and design AKE schemes suitable for quantum environments. Moony et al. introduced a two-party AKE protocol constructed on the ring-LWE challenge in this context. We have identified vulnerabilities in their scheme, particularly susceptibility to key mismatch attacks. We introduce a novel AKE mechanism based on the RLWE problem to overcome this flaw. We have demonstrated that the proposed protocol resists key mismatch attack, User impersonation, known session key threat, replay attack, privileged insider attack, men in the middle attack and offline password guessing. Moreover, We rigorously analyze and establish the security of the presented design within the ROM. The proposed design also achieves perfect forward secrecy. Additionally, we conduct performance evaluation and comparative study to gauge the practical effectiveness of our proposed design.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Cryptanalysis of a strongly secure authenticated key exchange protocol
    PLA Information Engineering University, Zhengzhou 450002, China
    不详
    Dianzi Yu Xinxi Xuebao, 2013, 9 (2278-2282):
  • [2] Cryptanalysis of an identity-based authenticated key exchange protocol
    Hatri, Younes
    Otmani, Ayoub
    Guenda, Kenza
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (03)
  • [3] Cryptanalysis of an Authenticated Key Agreement Protocol for Wireless Mobile Communications
    He, Debiao
    ETRI JOURNAL, 2012, 34 (03) : 482 - 484
  • [4] Cryptanalysis and Improvement of a Multi-factor Authenticated Key Exchange Protocol
    Ma, Zhiqiang
    He, Jun
    International Journal of Network Security, 2023, 25 (05) : 764 - 776
  • [5] Cryptanalysis with improvement on lattice-based authenticated key exchange protocol for mobile satellite communication networks
    Mishra, Dheerendra
    Pursharthi, Komal
    SECURITY AND PRIVACY, 2024, 7 (05)
  • [6] Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction
    Lu, Siqi
    Zhao, Jinhua
    Cheng, Qingfeng
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (03) : 567 - 578
  • [7] Cryptanalysis of the improved authenticated key agreement protocol
    Chang, TY
    Yang, CC
    Yang, YW
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 171 (02) : 771 - 774
  • [8] Cryptanalysis of modified authenticated key agreement protocol
    Ku, WC
    Wang, SD
    ELECTRONICS LETTERS, 2000, 36 (21) : 1770 - 1771
  • [9] Cryptanalysis of a three-party password-based authenticated key exchange protocol
    He, D. (hedebiao@163.com), 1600, Femto Technique Co., Ltd. (16):
  • [10] Cryptanalysis and Enhancements of Three-Party Authenticated Key Exchange Protocol using ECC
    Wu, Shuhua
    Zhu, Yuefei
    Pu, Qiong
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (04) : 1329 - 1343