ON SECURITY OF THE SESPAKE PROTOCOL

被引:0
|
作者
Alekseev, E. K. [1 ]
Smyshlyaev, S., V [1 ]
机构
[1] CryptoPro, Moscow, Russia
来源
关键词
models and methods in information security; cryptographic protocols; AUTHENTICATED KEY EXCHANGE;
D O I
10.17223/20710410/50/1
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The Security Evaluated Standardized Password Authenticated Key Exchange (SES-PAKE) protocol is standardized in Russia as R 50.1.115-2016. The current paper provides analysis of the protocol in relevant adversary models. We define new indistinguishability-based adversary model with a threat of false authentication that is an extension of the original indistinguishability-based model up to the case of protocols with authentication step without key diversification. We prove the protocol security in two adversary models with a classic threat of distinguishing a generated session key from a random string and with a threat of false authentication.
引用
收藏
页码:5 / 41
页数:37
相关论文
共 50 条
  • [31] A security analysis of the OAuth protocol
    Yang, Feng
    Manoharan, Sathiamoorthy
    [J]. 2013 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2013, : 271 - 276
  • [32] Sound Security Protocol Transformations
    Binh Thanh Nguyen
    Sprenger, Christoph
    [J]. PRINCIPLES OF SECURITY AND TRUST, POST 2013, 2013, 7796 : 83 - 104
  • [33] Security and Robustness by Protocol Testing
    Fu, Yulong
    Kone, Ousmane
    [J]. IEEE SYSTEMS JOURNAL, 2014, 8 (03): : 699 - 707
  • [34] Analysis of a security protocol in μCRL
    Pang, J
    [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2002, 2495 : 396 - 400
  • [35] Security in session initiation protocol
    Yuan, HC
    Jiang, LL
    Ma, J
    [J]. ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 1622 - 1626
  • [36] Security Analysis of SKI Protocol
    Babvey, Pouria
    Yajam, Habib Allah
    Eghlidos, Taraneh
    [J]. 2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 199 - 203
  • [37] A Security Service Protocol for MANETs
    Taddeo, Antonio Vincenzo
    Ferrante, Alberto
    [J]. 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 1076 - 1077
  • [38] Cordial Security Protocol Programming The Obol Protocol Language
    Myrvang, Per Harald
    Stabell-Kulo, Tage
    [J]. SECURITY PROTOCOLS, 2009, 5087 : 62 - +
  • [39] Research on the optimization of communication protocol in network security protocol
    Sun, Daoyuan
    [J]. SOFT COMPUTING, 2022, 26 (16) : 7959 - 7966
  • [40] Security analysis of the MPOA protocol
    Rampal, S
    Wang, CX
    [J]. IEEE SOUTHEASTCON '99, PROCEEDINGS, 1999, : 102 - 105