Security analysis of a password-based authentication protocol proposed to IEEE 1363

被引:21
|
作者
Zhao, Z
Dong, ZQ
Wang, YG [1 ]
机构
[1] Univ N Carolina, SIS Dept, Charlotte, NC 28223 USA
[2] Hexi Univ, ZhangYe City, Gansu, Peoples R China
[3] Lanzhou Univ, Lanzhou, Gansu, Peoples R China
关键词
password-based key agreement; dictionary attacks; AuthA; EKE;
D O I
10.1016/j.tcs.2005.11.038
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, several protocols for password-based authenticated key exchange have been proposed. These protocols aim to be secure even though the sample space of passwords may be small enough to be enumerated by an off-line adversary. In Eurocrypt 2000, Bellare, Pointcheval and Rogaway (BPR) presented a model and security definition for authenticated key exchange. They claimed that in the ideal-cipher model (random oracles), the two-flow protocol at the core of Encrypted Key Exchange (EKE) is secure. Bellare and Rogaway suggested several instantiations of the ideal cipher in their proposal to the IEEE P1363.2 working group. Since then there has been an increased interest in proving the security of password-based protocols in the ideal-cipher model. For example, Bresson, Chevassut, and Pointcheval have recently showed that the One-Encryption-Key-Exchange (OEKE) protocol is secure in the ideal cipher model. In this paper, we present examples of real (NOT ideal) ciphers (including naive implementations of the instantiations proposed to IEEE P1363.2) that would result in broken instantiations of the idealised AuthA protocol and OEKE protocol. Our result shows that the AuthA protocol can be instantiated in an insecure way, and that there are no well defined (let alone rigorous) ways to distinguish between secure and insecure instantiations. Thus, without a rigorous metric for ideal-ciphers, the value of provable security in ideal cipher model is limited. (c) 2005 Elsevier B.V. All rights reserved.
引用
收藏
页码:280 / 287
页数:8
相关论文
共 50 条
  • [31] A Password-based Grid Security Infrastructure
    Cai, Zhun
    ICDS 2008: SECOND INTERNATIONAL CONFERENCE ON THE DIGITAL SOCIETY, PROCEEDINGS, 2008, : 157 - 164
  • [32] Analysis and improvement of a password-based authenticated key exchange protocol
    Shu, Jian
    Xu, Chun-Xiang
    Tongxin Xuebao/Journal on Communications, 2010, 31 (03): : 51 - 56
  • [33] Security analysis of the generalized key agreement and password authentication protocol
    Yeh, HT
    Sun, HM
    Hwang, T
    IEEE COMMUNICATIONS LETTERS, 2001, 5 (11) : 462 - 463
  • [34] Security analysis and enhancement for three-party password-based authenticated key exchange protocol
    Zhao, Jianjie
    Gu, Dawu
    Zhang, Lei
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (03) : 273 - 278
  • [35] Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol
    Byun, Jin Wook
    Lee, Dong Hoon
    Lim, Jong In
    IEEE COMMUNICATIONS LETTERS, 2006, 10 (09) : 683 - 685
  • [36] Modular approach to the design and analysis of password-based security protocols
    DengGuo Feng
    WeiDong Chen
    Science in China Series F: Information Sciences, 2007, 50 : 381 - 398
  • [37] Security Flaws in Three Password-Based Remote User Authentication Schemes with Smart Cards
    Shim, Kyung-Ah
    CRYPTOLOGIA, 2012, 36 (01) : 62 - 69
  • [38] Modular approach to the design and analysis of password-based security protocols
    FENG DengGuo & CHEN WeiDong State Key Laboratory of Information Security
    Science China(Information Sciences), 2007, (03) : 381 - 398
  • [39] Modular approach to the design and analysis of password-based security protocols
    Feng DengGuo
    Chen WeiDong
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2007, 50 (03): : 381 - 398
  • [40] Scalable, password-based and threshold authentication for smart homes
    Huszti, Andrea
    Kovacs, Szabolcs
    Olah, Norbert
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (04) : 707 - 723