Cryptanalysis and amendment of authenticated key exchange protocol for mobile devices

被引:0
|
作者
Pursharthi, Komal [1 ]
Mishra, Dheerendra [1 ]
机构
[1] Maulana Azad Natl Inst Technol, Dept Math Bioinformat & Comp Applicat, Bhopal 462003, India
关键词
Authenticated key exchange; Ring learning with error; Post quantum security; Secure mobile communication; SCHEME; SECURE;
D O I
10.1007/s12083-025-01937-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent innovations in wireless technologies have led to a surge in the popularity of mobile applications, enabling users to access various web services via their mobile devices at any time and from any location. As a result, ensuring security in wireless communications has become paramount due to the inherently public nature of the communication channel. In the past twenty years, cryptographers have introduced numerous authentication schemes tailored for mobile devices to assure secure communication, typically following either a two-party or three-party scenario. However, many of these schemes rely on discrete log (DLP) or factorization (IF) number-theoretic hard problems, which can be efficiently solved using Shor's algorithm on a highly scalable quantum computer. Consequently, authenticated key exchange (AKE) protocols constructed on these mathematical problems are considered insecure in post-quantum environments. Thus, there is a pressing need to analyze and design AKE schemes suitable for quantum environments. Moony et al. introduced a two-party AKE protocol constructed on the ring-LWE challenge in this context. We have identified vulnerabilities in their scheme, particularly susceptibility to key mismatch attacks. We introduce a novel AKE mechanism based on the RLWE problem to overcome this flaw. We have demonstrated that the proposed protocol resists key mismatch attack, User impersonation, known session key threat, replay attack, privileged insider attack, men in the middle attack and offline password guessing. Moreover, We rigorously analyze and establish the security of the presented design within the ROM. The proposed design also achieves perfect forward secrecy. Additionally, we conduct performance evaluation and comparative study to gauge the practical effectiveness of our proposed design.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] Analysis and Improvement of an Authenticated Key Exchange Protocol
    Pan, Jiaxin
    Wang, Libin
    Ma, Changshe
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 417 - 431
  • [32] Authenticated key exchange protocol with selectable identities
    Guo, Hua
    Mu, Yi
    Zhang, Xiyong
    Li, Zhoujun
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (02): : 226 - 239
  • [33] Cryptanalysis of a key exchange protocol based on the ring
    Zhang, Yang
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2018, 29 (02) : 103 - 112
  • [34] A secure authenticated group key agreement protocol for resource-limited mobile devices
    Tseng, Yuh-Min
    COMPUTER JOURNAL, 2007, 50 (01): : 41 - 52
  • [35] Cryptanalysis of two password authenticated key exchange protocols based on RSA
    Cao, Tianjie
    Lim, Dongdai
    IEEE COMMUNICATIONS LETTERS, 2006, 10 (08) : 623 - 625
  • [36] A secure authenticated group key agreement protocol for resource-limited mobile devices
    Tseng, Yuh-Min
    Computer Journal, 2007, 50 (01): : 41 - 52
  • [37] Cryptanalysis of some improved password-authenticated key exchange schemes
    Phan, Raphael C. -W.
    Goi, Bok-Min
    Wong, Kah-Hoong
    COMPUTER COMMUNICATIONS, 2006, 29 (15) : 2822 - 2829
  • [38] An Efficient Leakage-Resilient Authenticated Key Exchange Protocol Suitable for IoT Devices
    Peng, An-Li
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE SYSTEMS JOURNAL, 2021, 15 (04): : 5343 - 5354
  • [39] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chih-ho CHOU
    Kuo-yu TSAI
    Tzong-chen WU
    Kuo-hui YEH
    JournalofZhejiangUniversity-ScienceC(Computers&Electronics), 2013, 14 (05) : 347 - 355
  • [40] A password-based authenticated key exchange protocol for mobile-commerce environments
    Fan, Ya-Jun
    Wen, Qiao-Yan
    Jin, Zheng-Ping
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2010, 33 (06): : 64 - 67