Outsider Key Compromise Impersonation Attack on a Multi-factor Authenticated Key Exchange Protocol

被引:3
|
作者
Ma, Zhiqiang [1 ]
He, Jun [1 ]
机构
[1] Chongqing Univ Technol, Chongqiang 400054, Peoples R China
关键词
Multi-factor; Authenticated key exchange; Key compromise impersonation attack; SECURE;
D O I
10.1007/978-3-031-16815-4_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated key exchange (AKE) protocol is a security mechanism that ensures two parties communicate securely on a public channel and keeps the legal client interacting with the honest server. Recently, Zhang et al. proposed a multi-factor authenticated key exchange (MFAKE) scheme for mobile communications. In this paper, we present the cryptoanalysis of their MFAKE scheme. We find out their MFAKE scheme has a security flaw that renders it insecure against manin-the-middle (MITM) attacks and outsider key compromise impersonation (KCI) attacks. We present a simple case of MITM attacks and illustrate how an adversary impersonates the client to the server if just compromising the key of the server. And an improved MFAKE scheme is proposed to overcome the weakness of Zhang's MFAKE scheme with minimum changes. We give the formal security proof of the improved MFAKE scheme in the random oracle model.
引用
收藏
页码:320 / 337
页数:18
相关论文
共 50 条
  • [31] Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment
    Reddy, Alavalapati Goutham
    Yoon, Eun-Jun
    Das, Ashok Kumar
    Odelu, Vanga
    Yoo, Kee-Young
    [J]. IEEE ACCESS, 2017, 5 : 3622 - 3639
  • [32] Key Reuse Attack on NewHope Key Exchange Protocol
    Liu, Chao
    Zheng, Zhongxiang
    Zou, Guangnan
    [J]. INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 163 - 176
  • [33] An authenticated key agreement protocol resistant to a dictionary attack
    Ryu, EK
    Kim, KW
    Yoo, KY
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 603 - 610
  • [34] Biometric Knowledge Extraction for Multi-Factor Authentication and Key Exchange
    Griffin, Phillip H.
    [J]. COMPLEX ADAPTIVE SYSTEMS, 2015, 2015, 61 : 66 - 71
  • [35] Password authenticated key exchange protocol in electronic vehicle key enviromment
    Ming, Yue
    Zou, Junwei
    Shen, Ting
    [J]. Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2021, 47 (04): : 698 - 705
  • [36] Two factor authenticated key exchange (TAKE) protocol in public wireless LANs
    Park, YM
    Park, SK
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (05) : 1382 - 1385
  • [37] A simple and robust anonymous two-factor authenticated key exchange protocol
    Li, Xiaowei
    Zhang, Yuqing
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (06) : 711 - 722
  • [38] Security analysis of a password authenticated key exchange protocol
    Bao, F
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2003, 2851 : 208 - 217
  • [39] Authenticated Key Exchange Protocol in One-Round
    Zhang, Xing-Lan
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PROCEEDINGS, 2009, 5574 : 226 - 233
  • [40] Universally composable security authenticated key exchange protocol
    [J]. Zhang, Zinan, 1600, Science Press (41):