A Security Patch for a Three-Party Key Exchange Protocol

被引:0
|
作者
ZHAO Jianjie1
2.Department of Computer Science and Engineering
机构
基金
国家高技术研究发展计划(863计划);
关键词
information security; authentication; key exchange; man-in-the-middle attack;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
The CLC protocol (proposed by Tzung-Her Chen, Wei-Bin Lee and Hsing-Bai Chen, CLC, for short) is a new three-party password-authenticated key exchange (3PAKE) protocol. This CLC protocol provides a superior round efficiency (only three rounds), and its resources required for computation are relatively few. However, we find that the leakage of values V Aand VB in the CLC protocol will make a man-in-the-middle attack feasible in practice, where V Aand VB are the authentication information chosen by the server for the participants A and B . In this paper, we describe our attack on the CLC protocol and further present a modified 3PAKE protocol, which is essentially an improved CLC protocol. Our protocol can resist attacks available, including man-in-the-middle attack we mount on the initial CLC protocol. Meanwhile, we allow that the participants choose their own passwords by themselves, thus avoiding the danger that the server is controlled in the initialization phase. Also, the computational cost of our protocol is lower than that of the CLC protocol.
引用
收藏
页码:242 / 246
页数:5
相关论文
共 50 条
  • [1] ON SECURITY OF A PRACTICAL THREE-PARTY KEY EXCHANGE PROTOCOL WITH ROUND EFfiCIENCY
    Lee, Cheng-Chi
    Chang, Ya-Fen
    INFORMATION TECHNOLOGY AND CONTROL, 2008, 37 (04): : 333 - 335
  • [2] Improvement of a three-party key exchange protocol
    Lin, Sida
    Xie, Qi
    PROCEEDINGS OF THE 2009 SECOND PACIFIC-ASIA CONFERENCE ON WEB MINING AND WEB-BASED APPLICATION, 2009, : 145 - +
  • [3] Simple three-party key exchange protocol
    Lu, Rongxing
    Cao, Zhenfu
    COMPUTERS & SECURITY, 2007, 26 (01) : 94 - 97
  • [4] An Efficient Password Security of Three-Party Key Exchange Protocol based on ECDLP
    Kar, Jayaprakash
    Majhi, Banshidhar
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2009, 3 (04): : 25 - 32
  • [5] A PRACTICAL THREE-PARTY AUTHENTICATED KEY EXCHANGE PROTOCOL
    Lo, Nai Wei
    Yeh, Kuo-Hui
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (06): : 2469 - 2483
  • [6] Three weaknesses in a simple three-party key exchange protocol
    Chung, Hao-Rung
    Ku, Wei-Chi
    INFORMATION SCIENCES, 2008, 178 (01) : 220 - 229
  • [7] A novel three-party encrypted key exchange protocol
    Chang, CC
    Chang, YF
    COMPUTER STANDARDS & INTERFACES, 2004, 26 (05) : 471 - 476
  • [8] Cryptanalysis of simple three-party key exchange protocol
    Guo, Hua
    Li, Zhoujun
    Mu, Yi
    Zhang, Xiyong
    COMPUTERS & SECURITY, 2008, 27 (1-2) : 16 - 21
  • [9] Cryptanalysis of a Simple Three-party Key Exchange Protocol
    He, Debiao
    Chen, Jianhua
    Hu, Jin
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2010, 34 (03): : 337 - 339
  • [10] Cryptanalysis of a simple three-party key exchange protocol
    Debiao, He
    Jianhua, Chen
    Jin, Hu
    Informatica (Ljubljana), 2010, 34 (03) : 337 - 339