Cryptanalysis and amendment of authenticated key exchange protocol for mobile devices

被引:0
|
作者
Pursharthi, Komal [1 ]
Mishra, Dheerendra [1 ]
机构
[1] Maulana Azad Natl Inst Technol, Dept Math Bioinformat & Comp Applicat, Bhopal 462003, India
关键词
Authenticated key exchange; Ring learning with error; Post quantum security; Secure mobile communication; SCHEME; SECURE;
D O I
10.1007/s12083-025-01937-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent innovations in wireless technologies have led to a surge in the popularity of mobile applications, enabling users to access various web services via their mobile devices at any time and from any location. As a result, ensuring security in wireless communications has become paramount due to the inherently public nature of the communication channel. In the past twenty years, cryptographers have introduced numerous authentication schemes tailored for mobile devices to assure secure communication, typically following either a two-party or three-party scenario. However, many of these schemes rely on discrete log (DLP) or factorization (IF) number-theoretic hard problems, which can be efficiently solved using Shor's algorithm on a highly scalable quantum computer. Consequently, authenticated key exchange (AKE) protocols constructed on these mathematical problems are considered insecure in post-quantum environments. Thus, there is a pressing need to analyze and design AKE schemes suitable for quantum environments. Moony et al. introduced a two-party AKE protocol constructed on the ring-LWE challenge in this context. We have identified vulnerabilities in their scheme, particularly susceptibility to key mismatch attacks. We introduce a novel AKE mechanism based on the RLWE problem to overcome this flaw. We have demonstrated that the proposed protocol resists key mismatch attack, User impersonation, known session key threat, replay attack, privileged insider attack, men in the middle attack and offline password guessing. Moreover, We rigorously analyze and establish the security of the presented design within the ROM. The proposed design also achieves perfect forward secrecy. Additionally, we conduct performance evaluation and comparative study to gauge the practical effectiveness of our proposed design.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] AN AUTHENTICATED KEY EXCHANGE PROTOCOL FOR MOBILE STATIONS FROM TWO DISTINCT HOME NETWORKS
    Wang, Hao-Li
    Chen, Tzung-Her
    Li, Long-Sheng
    Wu, Yan-Ting
    Chen, Jhong
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (09): : 4125 - 4132
  • [42] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chih-ho Chou
    Kuo-yu Tsai
    Tzong-chen Wu
    Kuo-hui Yeh
    Journal of Zhejiang University SCIENCE C, 2013, 14 : 347 - 355
  • [43] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chou, Chih-ho
    Tsai, Kuo-yu
    Wu, Tzong-chen
    Yeh, Kuo-hui
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2013, 14 (05): : 347 - 355
  • [44] Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
    Hu, Xuexian
    Zhang, Zhenfeng
    NONLINEAR DYNAMICS, 2014, 78 (02) : 1293 - 1300
  • [45] Cryptanalysis of a three-party password- based authenticated key exchange protocol using Weil pairing
    He, Debiao
    Chen, Jianhua
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 244 - 251
  • [46] Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
    Xuexian Hu
    Zhenfeng Zhang
    Nonlinear Dynamics, 2014, 78 : 1293 - 1300
  • [47] Cryptanalysis of Ateniese-Steiner-Tsudik-Authenticated Group Key Management Protocol
    Portela, Daniel Camazon
    Sanchez, Alvaro Otero
    Lopez-Ramos, Juan Antonio
    APPLIED SCIENCES-BASEL, 2024, 14 (18):
  • [48] Security analysis of a password authenticated key exchange protocol
    Bao, F
    INFORMATION SECURITY, PROCEEDINGS, 2003, 2851 : 208 - 217
  • [49] Authenticated key exchange protocol with enhanced freshness properties
    Huang, Hai
    Cao, Zhenfu
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (10) : 1130 - 1136
  • [50] Universally composable security authenticated key exchange protocol
    Zhang, Zinan, 1600, Science Press (41):