ON SECURITY OF THE SESPAKE PROTOCOL

被引:0
|
作者
Alekseev, E. K. [1 ]
Smyshlyaev, S., V [1 ]
机构
[1] CryptoPro, Moscow, Russia
来源
关键词
models and methods in information security; cryptographic protocols; AUTHENTICATED KEY EXCHANGE;
D O I
10.17223/20710410/50/1
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The Security Evaluated Standardized Password Authenticated Key Exchange (SES-PAKE) protocol is standardized in Russia as R 50.1.115-2016. The current paper provides analysis of the protocol in relevant adversary models. We define new indistinguishability-based adversary model with a threat of false authentication that is an extension of the original indistinguishability-based model up to the case of protocols with authentication step without key diversification. We prove the protocol security in two adversary models with a classic threat of distinguishing a generated session key from a random string and with a threat of false authentication.
引用
收藏
页码:5 / 41
页数:37
相关论文
共 50 条
  • [41] On the security of the Tor authentication protocol
    Goldberg, Ian
    [J]. Privacy Enhancing Technologies, 2006, 4258 : 316 - 331
  • [42] Research on the optimization of communication protocol in network security protocol
    Daoyuan Sun
    [J]. Soft Computing, 2022, 26 : 7959 - 7966
  • [43] A thin security layer protocol over IP protocol on TCP/IP suite for security enhancement
    Al-Jarrah, Mohammad
    Tamimi, Abdel-Karim R.
    [J]. 2006 INNOVATIONS IN INFORMATION TECHNOLOGY, 2006, : 232 - +
  • [44] A Security Analysis and Revised Security Extension for the Precision Time Protocol
    Itkin, Eyal
    Wool, Avishai
    [J]. 2016 IEEE INTERNATIONAL SYMPOSIUM ON PRECISION CLOCK SYNCHRONIZATION FOR MEASUREMENT, CONTROL AND COMMUNICATION (ISPCS 2016), 2016, : 12 - 17
  • [45] Voice interactive personalized security protocol: Definition and security analysis
    Zisiadis, Dimitris
    Kopsidas, Spyros
    Tassiulas, Leandros
    [J]. 2007 3RD IEEE WORKSHOP ON SECURE NETWORK PROTOCOLS, 2007, : 31 - 36
  • [46] On the security of RFID anti-counting security protocol (ACSP)
    Safkhani, Masoumeh
    Bagheri, Nasour
    Mahani, Ali
    [J]. JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, 2014, 259 : 512 - 521
  • [47] A Security Analysis and Revised Security Extension for the Precision Time Protocol
    Itkin, Eyal
    Wool, Avishai
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (01) : 22 - 34
  • [48] SPUC: Security protocol for ubiquitous computing
    Yang, Fan
    Lv, Qingcong
    Cao, Qiying
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 757 - 760
  • [49] OCPP Protocol: Security Threats and Challenges
    Alcaraz, Cristina
    Lopez, Javier
    Wolthusen, Stephen
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (05) : 2452 - 2459
  • [50] Establishing and preserving protocol security goals
    Guttman, Joshua D.
    [J]. JOURNAL OF COMPUTER SECURITY, 2014, 22 (02) : 203 - 267