A Secure Two-Party Password-Authenticated Key Exchange Protocol

被引:0
|
作者
Saeed, Maryam [1 ]
Shahhoseini, Hadi Shahriar [1 ]
Mackvandi, Ali [2 ]
Rezaeinezhad, Mohammad Reza [2 ]
Naddafiun, Mansour [2 ]
Bidoki, Mohammad Zare [2 ]
机构
[1] Iran Univ Sci & Technol, Hengam St,Resalat Sq, Tehran, Iran
[2] Pishgaman Kavir Yazd Cooperat, R&D Dept, Yazd, Iran
关键词
Cryptographic protocols; Password-authenticated key exchange; attacks; Forward Secrecy; Ephemeral Key Compromise Impersonation; Denial-of-Service (DoS);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
PAKE protocols which stands for Password Authenticated Key Exchange are of great importance for providing secure communications over the Internet. They permit two entities to share a session key in an authentic manner based on a human-memorable password. In 2006, Kolesnikov and Rackoff proposed an improvement to the Halevi and Krawczyk's PAKE protocols. In 2010, they revised their preceding protocol and introduced an improvement to it. In this paper, it is shown that not only are Halevi and Krawczyk's PAKE protocols vulnerable to ephemeral key compromise impersonation and malicious server attacks, but they also fail to provide key confirmation property simultaneously, one of which does not even satisfy Forward Secrecy attribute. It is also shown that Kolesnikov and Rackoff's protocols are susceptible to ephemeral key compromise impersonation and to Denial-of-Service (DoS) attacks, nor do they satisfy Forward Secrecy, mutual authentication, and key confirmation attributes. Additionally, they are prone to the disclosure of pre-shared secret key. Two improved protocols, called S2PAKEv1 and S2PAKEv2, are also proposed providing several security attributes, both of which are still efficient. S2PAKEv1 has two rounds with mutual authentication and not providing key confirmation, while S2PAKEv2 is of three rounds holding mutual authentication and key confirmation.
引用
收藏
页码:466 / 474
页数:9
相关论文
共 50 条
  • [1] An optimal round two-party password-authenticated key agreement protocol
    Strangio, Maurizio A.
    [J]. FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 216 - 223
  • [2] One-round protocol for two-party verifier-based password-authenticated key exchange
    Kwon, Jeong Ok
    Sakurai, Kouichi
    Lee, Dong Hoon
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 87 - 96
  • [3] A secure threshold anonymous password-authenticated key exchange protocol
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 444 - +
  • [4] Provably secure three-party password-authenticated key exchange
    Lin, CL
    Wen, HA
    Hwang, T
    Sun, HM
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (11) : 2990 - 3000
  • [5] Parallelizable password-authenticated key exchange protocol
    Lee, SW
    Yoo, KY
    [J]. PARALLEL PROCESSING AND APPLIED MATHEMATICS, 2004, 3019 : 1014 - 1019
  • [6] Provably Secure Quantum Resistance Efficient Password-Authenticated Key Exchange Protocol
    Yin A.-Q.
    Wang D.
    Guo Y.-B.
    Chen L.
    Tang D.
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2022, 45 (11): : 2321 - 2336
  • [7] A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks
    Farash, Mohammad Sabzinejad
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (17): : 4897 - 4913
  • [8] Provably secure threshold password-authenticated key exchange
    Di Raimondo, Mario
    Gennaro, Rosario
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2006, 72 (06) : 978 - 1001
  • [9] Provably secure quantum resistance two-server password-authenticated key exchange protocol
    Yin A.
    Guo Y.
    Wang D.
    Qu T.
    Chen L.
    [J]. Tongxin Xuebao/Journal on Communications, 2022, 43 (03): : 14 - 29
  • [10] Secure verifier-based three-party password-authenticated key exchange
    Pu, Qiong
    Wang, Jian
    Wu, Shuhua
    Fu, Ji
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2013, 6 (01) : 15 - 25