Efficient three-party key exchange protocols with round efficiency

被引:12
|
作者
Youn, Taek-Young [1 ]
Kang, Eun Sook [2 ]
Lee, Changhoon [3 ]
机构
[1] Elect & Telecommun Res Inst, Cryptog Res Team, Taejon 305700, South Korea
[2] Korea Univ, Dept Math, Yeongi Gun, Chungcheongnam, South Korea
[3] Hanshin Univ, Sch Comp Engn, Osan Si, Gyeonggi Do, South Korea
关键词
Cryptanalysis; Password; Key exchange; Three-party setting; Password guessing attack;
D O I
10.1007/s11235-011-9649-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Recently, Guo et al. discovered some security flaws of the simple three-party key exchange protocol proposed by Lu and Cao, and proposed an improved protocol. Independently, Chung and Ku also showed some weaknesses of Lu and Cao's protocol, and provided an improved protocol. In this paper, we review some insecurity of Lu and Cao's protocol and analyze two improved protocols proposed by Guo et al. and Chung and Ku. Then we show that the protocols are still insecure. They are vulnerable to an adversary who performs an off-line password guessing attack. We provide a countermeasure by performing detailed analysis on the security flaws in two improved protocols. We also propose a secure three-party password-authenticated key exchange protocol which requires three rounds.
引用
收藏
页码:1367 / 1376
页数:10
相关论文
共 50 条
  • [31] A novel three-party encrypted key exchange protocol
    Chang, CC
    Chang, YF
    COMPUTER STANDARDS & INTERFACES, 2004, 26 (05) : 471 - 476
  • [32] Cryptanalysis of simple three-party key exchange protocol
    Guo, Hua
    Li, Zhoujun
    Mu, Yi
    Zhang, Xiyong
    COMPUTERS & SECURITY, 2008, 27 (1-2) : 16 - 21
  • [33] A Security Patch for a Three-Party Key Exchange Protocol
    ZHAO Jianjie1
    2.Department of Computer Science and Engineering
    WuhanUniversityJournalofNaturalSciences, 2010, 15 (03) : 242 - 246
  • [34] Cryptanalysis of a Simple Three-party Key Exchange Protocol
    He, Debiao
    Chen, Jianhua
    Hu, Jin
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2010, 34 (03): : 337 - 339
  • [35] Cryptanalysis of a simple three-party key exchange protocol
    Debiao, He
    Jianhua, Chen
    Jin, Hu
    Informatica (Ljubljana), 2010, 34 (03) : 337 - 339
  • [36] Three-party Encrypted Key Exchange: Attacks and a Solution
    Lin, Chun-Li
    Sun, Hung-Min
    Hwang, Tzonelih
    Operating Systems Review (ACM), 2000, 34 (04): : 12 - 20
  • [37] IMPROVING TWO NOVEL THREE-PARTY ENCRYPTED KEY EXCHANGE PROTOCOLS WITH PERFECT FORWARD SECRECY
    Lee, Cheng-Chi
    Chang, Rui-Xiang
    Ko, Hsien-Ju
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2010, 21 (06) : 979 - 991
  • [38] A secure and efficient three-party password-based authenticated key exchange protocol
    He, Yong-Zhong
    Cai, Ying
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 280 - +
  • [39] Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
    Wu, Shuhua
    Pu, Qiong
    Wang, Shengbao
    He, Debiao
    INFORMATION SCIENCES, 2012, 215 : 83 - 96
  • [40] Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme
    Wu, Shuhua
    Chen, Kefei
    Pu, Qiong
    Zhu, Yuefei
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2013, 26 (05) : 674 - 686