Security analysis of a password-based authentication protocol proposed to IEEE 1363

被引:21
|
作者
Zhao, Z
Dong, ZQ
Wang, YG [1 ]
机构
[1] Univ N Carolina, SIS Dept, Charlotte, NC 28223 USA
[2] Hexi Univ, ZhangYe City, Gansu, Peoples R China
[3] Lanzhou Univ, Lanzhou, Gansu, Peoples R China
关键词
password-based key agreement; dictionary attacks; AuthA; EKE;
D O I
10.1016/j.tcs.2005.11.038
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, several protocols for password-based authenticated key exchange have been proposed. These protocols aim to be secure even though the sample space of passwords may be small enough to be enumerated by an off-line adversary. In Eurocrypt 2000, Bellare, Pointcheval and Rogaway (BPR) presented a model and security definition for authenticated key exchange. They claimed that in the ideal-cipher model (random oracles), the two-flow protocol at the core of Encrypted Key Exchange (EKE) is secure. Bellare and Rogaway suggested several instantiations of the ideal cipher in their proposal to the IEEE P1363.2 working group. Since then there has been an increased interest in proving the security of password-based protocols in the ideal-cipher model. For example, Bresson, Chevassut, and Pointcheval have recently showed that the One-Encryption-Key-Exchange (OEKE) protocol is secure in the ideal cipher model. In this paper, we present examples of real (NOT ideal) ciphers (including naive implementations of the instantiations proposed to IEEE P1363.2) that would result in broken instantiations of the idealised AuthA protocol and OEKE protocol. Our result shows that the AuthA protocol can be instantiated in an insecure way, and that there are no well defined (let alone rigorous) ways to distinguish between secure and insecure instantiations. Thus, without a rigorous metric for ideal-ciphers, the value of provable security in ideal cipher model is limited. (c) 2005 Elsevier B.V. All rights reserved.
引用
收藏
页码:280 / 287
页数:8
相关论文
共 50 条
  • [21] On Unlinkability of Password-Based Anonymous Authentication
    Shin, SeongHan
    Kobara, Kazukuni
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (06) : 1320 - 1324
  • [22] Security Analysis and Improvements of a Three-Party Password-Based Key Exchange Protocol
    Tu, Hang
    Shen, Han
    He, Debiao
    Chen, Jianhua
    INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (01): : 57 - 63
  • [23] An efficient client-client password-based authentication scheme with provable security
    Farash, Mohammad Sabzinejad
    Attari, Mahmoud Ahmadian
    JOURNAL OF SUPERCOMPUTING, 2014, 70 (02): : 1002 - 1022
  • [24] Cryptanalysis and Enhancement of a Password-Based Authentication Scheme
    Eldefrawy, Mohamed H.
    Al-Muhtadi, Jalal F.
    2015 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2015, : 548 - 551
  • [25] An Improved Password-Based Remote User Authentication Protocol without Smart Cards
    Jiang, Qi
    Ma, Jianfeng
    Li, Guangsong
    Ma, Zhuo
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (02): : 150 - 158
  • [26] Password-based authentication: Preventing dictionary attacks
    Chakrabarti, Saikat
    Singhal, Mukesh
    COMPUTER, 2007, 40 (06) : 68 - +
  • [27] Password-based authentication and the experiences of end users
    Ezugwu, Assumpta
    Ukwandu, Elochukwu
    Ugwu, Celestine
    Ezema, Modesta
    Olebara, Comfort
    Ndunagu, Juliana
    Ofusori, Lizzy
    Ome, Uchenna
    SCIENTIFIC AFRICAN, 2023, 21
  • [28] Indistinguishability and unextractablility of password-based authentication in blockchain
    Huang, Xinyi
    Zhang, Yuexin
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 112 : 561 - 566
  • [29] On compromising password-based authentication over HTTPS
    Saito, Takamichi
    Hatsugai, Ryosuke
    Kito, Toshiyuki
    20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS, 2006, : 869 - +
  • [30] Security Analysis and Improvements of Three-Party Password-Based Authenticated Key Exchange Protocol
    Wang, Qingping
    Ruan, Ou
    Wang, Zihao
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 497 - 508