Efficient three-party key exchange protocols with round efficiency

被引:12
|
作者
Youn, Taek-Young [1 ]
Kang, Eun Sook [2 ]
Lee, Changhoon [3 ]
机构
[1] Elect & Telecommun Res Inst, Cryptog Res Team, Taejon 305700, South Korea
[2] Korea Univ, Dept Math, Yeongi Gun, Chungcheongnam, South Korea
[3] Hanshin Univ, Sch Comp Engn, Osan Si, Gyeonggi Do, South Korea
关键词
Cryptanalysis; Password; Key exchange; Three-party setting; Password guessing attack;
D O I
10.1007/s11235-011-9649-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Recently, Guo et al. discovered some security flaws of the simple three-party key exchange protocol proposed by Lu and Cao, and proposed an improved protocol. Independently, Chung and Ku also showed some weaknesses of Lu and Cao's protocol, and provided an improved protocol. In this paper, we review some insecurity of Lu and Cao's protocol and analyze two improved protocols proposed by Guo et al. and Chung and Ku. Then we show that the protocols are still insecure. They are vulnerable to an adversary who performs an off-line password guessing attack. We provide a countermeasure by performing detailed analysis on the security flaws in two improved protocols. We also propose a secure three-party password-authenticated key exchange protocol which requires three rounds.
引用
收藏
页码:1367 / 1376
页数:10
相关论文
共 50 条
  • [1] Efficient three-party key exchange protocols with round efficiency
    Taek-Young Youn
    Eun Sook Kang
    Changhoon Lee
    Telecommunication Systems, 2013, 52 : 1367 - 1376
  • [2] A practical three-party key exchange protocol with round efficiency
    Chang, Ya-Fen
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2008, 4 (04): : 953 - 960
  • [3] ON SECURITY OF A PRACTICAL THREE-PARTY KEY EXCHANGE PROTOCOL WITH ROUND EFfiCIENCY
    Lee, Cheng-Chi
    Chang, Ya-Fen
    INFORMATION TECHNOLOGY AND CONTROL, 2008, 37 (04): : 333 - 335
  • [4] A round- and computation-efficient three-party authenticated key exchange protocol
    Chen, Tzung-Her
    Lee, Wei-Bin
    Chen, Hsing-Bai
    JOURNAL OF SYSTEMS AND SOFTWARE, 2008, 81 (09) : 1581 - 1590
  • [5] Cryptanalysis of two three-party encrypted key exchange protocols
    Lo, N. W.
    Yeh, Kuo-Hui
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1167 - 1174
  • [6] New Efficient Three-Party Quantum Key Distribution Protocols
    Shih, Han-Cheng
    Lee, Kuo-Chang
    Hwang, Tzonelih
    IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS, 2009, 15 (06) : 1602 - 1606
  • [7] Communication-efficient three-party protocols for authentication and key agreement
    Lee, Tian-Fu
    Liu, Jenn-Long
    Sung, Mei-Jiun
    Yang, Shiueng-Bien
    Chen, Chia-Mei
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2009, 58 (04) : 641 - 648
  • [8] Efficient three-party key exchange using smart cards
    Jaung, WS
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 619 - 624
  • [9] How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols
    Wang, Weijia
    Hu, Lei
    Li, Yong
    INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 218 - +
  • [10] A Computation-Efficient Three-Party Encrypted Key Exchange Protocol
    Lee, Cheng-Chi
    Chen, Shun-Der
    Chen, Chin-Ling
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (03): : 573 - 579