Cryptanalysis and amendment of authenticated key exchange protocol for mobile devices

被引:0
|
作者
Pursharthi, Komal [1 ]
Mishra, Dheerendra [1 ]
机构
[1] Maulana Azad Natl Inst Technol, Dept Math Bioinformat & Comp Applicat, Bhopal 462003, India
关键词
Authenticated key exchange; Ring learning with error; Post quantum security; Secure mobile communication; SCHEME; SECURE;
D O I
10.1007/s12083-025-01937-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent innovations in wireless technologies have led to a surge in the popularity of mobile applications, enabling users to access various web services via their mobile devices at any time and from any location. As a result, ensuring security in wireless communications has become paramount due to the inherently public nature of the communication channel. In the past twenty years, cryptographers have introduced numerous authentication schemes tailored for mobile devices to assure secure communication, typically following either a two-party or three-party scenario. However, many of these schemes rely on discrete log (DLP) or factorization (IF) number-theoretic hard problems, which can be efficiently solved using Shor's algorithm on a highly scalable quantum computer. Consequently, authenticated key exchange (AKE) protocols constructed on these mathematical problems are considered insecure in post-quantum environments. Thus, there is a pressing need to analyze and design AKE schemes suitable for quantum environments. Moony et al. introduced a two-party AKE protocol constructed on the ring-LWE challenge in this context. We have identified vulnerabilities in their scheme, particularly susceptibility to key mismatch attacks. We introduce a novel AKE mechanism based on the RLWE problem to overcome this flaw. We have demonstrated that the proposed protocol resists key mismatch attack, User impersonation, known session key threat, replay attack, privileged insider attack, men in the middle attack and offline password guessing. Moreover, We rigorously analyze and establish the security of the presented design within the ROM. The proposed design also achieves perfect forward secrecy. Additionally, we conduct performance evaluation and comparative study to gauge the practical effectiveness of our proposed design.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] Secure authenticated key exchange protocol
    Kim, WH
    Kim, HS
    Lee, SW
    Yoo, KY
    COMPUTERS AND THEIR APPLICATIONS, 2003, : 5 - 8
  • [22] Cryptanalysis of the Dragonfly key exchange protocol
    Clarke, Dylan
    Hao, Feng
    IET INFORMATION SECURITY, 2014, 8 (06) : 283 - 289
  • [23] Cryptanalysis of two password-authenticated key exchange protocols
    Wan, ZG
    Wang, SH
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 164 - 175
  • [24] Cryptanalysis and Enhancement of Modified Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
    Shim, Kyung-Ah
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (12) : 3837 - 3839
  • [25] A variant of password authenticated key exchange protocol
    Zhang, Yuexin
    Xiang, Yang
    Wu, Wei
    Alelaiwi, Abdulhameed
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 699 - 711
  • [26] A Provably Secure Authenticated Key Exchange Protocol
    Zhang, Lijiang
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 292 - 297
  • [27] An novel anonymous authenticated and key exchange protocol
    Cui, Hui
    Cao, Tianjie
    Journal of Networks, 2009, 4 (10) : 985 - 992
  • [28] Another Cryptanalysis of a Tropical Key Exchange Protocol
    Jackson, J.
    Perumal, R.
    IAENG International Journal of Computer Science, 2023, 50 (04)
  • [29] Cryptanalysis of a lattice based key exchange protocol
    Mao, Shaowu
    Zhang, Pei
    Wang, Houzhen
    Zhang, Huanguo
    Wu, Wanqing
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (02)
  • [30] Cryptanalysis of a lattice based key exchange protocol
    Shaowu MAO
    Pei ZHANG
    Houzhen WANG
    Huanguo ZHANG
    Wanqing WU
    ScienceChina(InformationSciences), 2017, 60 (02) : 196 - 198