Outsider Key Compromise Impersonation Attack on a Multi-factor Authenticated Key Exchange Protocol

被引:3
|
作者
Ma, Zhiqiang [1 ]
He, Jun [1 ]
机构
[1] Chongqing Univ Technol, Chongqiang 400054, Peoples R China
关键词
Multi-factor; Authenticated key exchange; Key compromise impersonation attack; SECURE;
D O I
10.1007/978-3-031-16815-4_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated key exchange (AKE) protocol is a security mechanism that ensures two parties communicate securely on a public channel and keeps the legal client interacting with the honest server. Recently, Zhang et al. proposed a multi-factor authenticated key exchange (MFAKE) scheme for mobile communications. In this paper, we present the cryptoanalysis of their MFAKE scheme. We find out their MFAKE scheme has a security flaw that renders it insecure against manin-the-middle (MITM) attacks and outsider key compromise impersonation (KCI) attacks. We present a simple case of MITM attacks and illustrate how an adversary impersonates the client to the server if just compromising the key of the server. And an improved MFAKE scheme is proposed to overcome the weakness of Zhang's MFAKE scheme with minimum changes. We give the formal security proof of the improved MFAKE scheme in the random oracle model.
引用
收藏
页码:320 / 337
页数:18
相关论文
共 50 条
  • [1] Multi-factor authenticated key exchange
    Pointcheval, David
    Zimmer, Sebastien
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2008, 5037 : 277 - 295
  • [2] Cryptanalysis and Improvement of a Multi-factor Authenticated Key Exchange Protocol
    Ma, Zhiqiang
    He, Jun
    [J]. International Journal of Network Security, 2023, 25 (05) : 764 - 776
  • [3] Multi-factor Identity Authenticated Key Agreement Protocol
    Wang, Jun
    Chen, Yue
    Yang, Gang
    Jia, Hongyong
    Lan, Julong
    [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 5597 - 5602
  • [4] Multi-Factor Authenticated Key Exchange Protocol in the Three-Party Setting
    Liu, Ying
    Wei, Fushan
    Ma, Chuangui
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 255 - 267
  • [5] MAKA: Provably Secure Multi-factor Authenticated Key Agreement Protocol
    Liu, Xiaoxue
    Li, Yanping
    Qu, Juan
    Jiang, Qi
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (03): : 669 - 677
  • [6] Authenticated key exchange protocol secure against offline dictionary attack and server compromise
    Park, SB
    Kang, MS
    Lee, SJ
    [J]. GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 924 - 931
  • [7] An efficient multi-factor authenticated key exchange with physically unclonable function
    Byun, Jin Wook
    [J]. 2019 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2019, : 477 - 480
  • [8] Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications
    Zhang, Rui
    Xiao, Yuting
    Sun, Shuzhou
    Ma, Hui
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) : 625 - 634
  • [9] A Privacy-Preserving Multi-Factor Authenticated Key Exchange Protocol with Provable Security for Cloud Computing
    Wei, Fu-Shah
    Jiang, Qi
    Zhang, Rui-Jie
    Ma, Chuan-Gui
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (04) : 907 - 921
  • [10] Biometrics-Based Authenticated Key Exchange with Multi-Factor Fuzzy Extractor
    Tran, Hong Yen
    Hu, Jiankun
    Hu, Wen
    [J]. IEEE Transactions on Information Forensics and Security, 2024, 19 : 9344 - 9358