Secure authenticated key exchange protocol

被引:0
|
作者
Kim, WH [1 ]
Kim, HS [1 ]
Lee, SW [1 ]
Yoo, KY [1 ]
机构
[1] Kyungpook Natl Univ, Informat Secur, Taegu 702701, South Korea
关键词
cryptography; password authentication; key exchange;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
From Seo and Sweeney proposed SAKA (Simple Authenticated Key agreement Algorithm), many SAKA variants were proposed to cope with the weaknesses in SAKA. However, they still are vulnerable to off-line password guessing attack. This paper proposes a new secure authenticated key exchange protocol that can resist off-line password guessing attack. To solve the vulnerability of former protocols, keyed one-way hash function is used in the process of key verification. Proposed protocol solves all weaknesses in SAKA and its variants.
引用
收藏
页码:5 / 8
页数:4
相关论文
共 50 条
  • [41] Analysis and Improvement of an Authenticated Key Exchange Protocol
    Pan, Jiaxin
    Wang, Libin
    Ma, Changshe
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 417 - 431
  • [42] Authenticated key exchange protocol with selectable identities
    Guo, Hua
    Mu, Yi
    Zhang, Xiyong
    Li, Zhoujun
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (02): : 226 - 239
  • [43] A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated Encryption
    Wei, Fushan
    Zhang, Ruijie
    Shen, Jian
    [J]. ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 849 - 855
  • [44] Authenticated key exchange secure against dictionary attacks
    Bellare, M
    Pointcheval, D
    Rogaway, P
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 139 - 155
  • [45] Biometrics-Authenticated Key Exchange for Secure Messaging
    Wang, Mei
    He, Kun
    Chen, Jing
    Li, Zengpeng
    Zhao, Wei
    Du, Ruiying
    [J]. CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2618 - 2631
  • [46] Secure authenticated key exchange for WSNs in IoT applications
    Qi, Mingping
    Chen, Jianhua
    [J]. JOURNAL OF SUPERCOMPUTING, 2021, 77 (12): : 13897 - 13910
  • [47] Secure authenticated key exchange for WSNs in IoT applications
    Mingping Qi
    Jianhua Chen
    [J]. The Journal of Supercomputing, 2021, 77 : 13897 - 13910
  • [48] A secure authenticated and key exchange scheme for fog computing
    Chen, Chien-Ming
    Huang, Yanyu
    Wang, King-Hang
    Kumari, Saru
    Wu, Mu-En
    [J]. ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (09) : 1200 - 1215
  • [49] Tightly-Secure Authenticated Key Exchange, Revisited
    Jager, Tibor
    Kiltz, Eike
    Riepel, Doreen
    Schaege, Sven
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT I, 2021, 12696 : 117 - 146
  • [50] Introducing a Verified Authenticated Key Exchange Protocol over Voice Channels for Secure Voice Communication
    Krasnowski, Piotr
    Lebrun, Jerome
    Martin, Bruno
    [J]. ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 683 - 690