Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication

被引:0
|
作者
Dario Catalano
David Pointcheval
Thomas Pornin
机构
[1] CNRS-LIENS,
[2] Ecole Normale Superieure,undefined
[3] Cryptolog,undefined
来源
Journal of Cryptology | 2007年 / 20卷
关键词
Random Oracle; Group Isomorphism; Dictionary Attack; Jacobi Symbol; Polynomial Time Turing Machine;
D O I
暂无
中图分类号
学科分类号
摘要
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their passwords or pass-phrases. For this reason it is very desirable to have protocols that do not require long passwords to guarantee security, even in the case in which exhaustive search is feasible. This is actually the goal of password-based key exchange protocols, secure against off-line dictionary attacks: two people share a password (possibly a very small one, say a 4-digit number), and after the protocol execution, they end up sharing a large secret session key (known to both of them, but nobody else). Then an adversary attacking the system should try several connections (on average 5000 for the above short password) in order to be able to get the correct password. Such a large number of erroneous connections can be prevented by various means. Our results can be highlighted as follows. First we define a new primitive that we call trapdoor hard-to-invert group isomorphisms, and give some candidates. Then we present a generic password-based key exchange construction that admits a security proof assuming that these objects exist. Finally, we instantiate our general scheme with some concrete examples, such as the Diffie-Hellman function and the RSA function, but more interestingly the modular square-root function, which leads to the first scheme with security related to the integer factorization problem. Furthermore, the latter variant is very efficient for one party (the server). Our results hold in the random-oracle model.
引用
收藏
页码:115 / 149
页数:34
相关论文
共 50 条
  • [1] Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication
    Catalano, Dario
    Pointcheval, David
    Pornin, Thomas
    [J]. JOURNAL OF CRYPTOLOGY, 2007, 20 (01) : 115 - 149
  • [2] Continuous hard-to-invert functions and biometric authentication
    Grigoriev, Dima
    Nikolenko, Sergey
    [J]. GROUPS COMPLEXITY CRYPTOLOGY, 2012, 4 (01) : 19 - 32
  • [3] Secure password-based authentication in WLAN
    Keshava, M.
    [J]. Journal of the Indian Institute of Science, 2006, 86 (04) : 389 - 396
  • [4] Securing Password in Static Password-based Authentication: A Review
    Mohamedali, Intisar A.
    Fadlalla, Yahia
    [J]. PROCEEDINGS OF 2017 SUDAN CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (SCCSIT), 2017, : 98 - 102
  • [5] IPAKE: Isomorphisms for password-based authenticated key exchange
    Catalano, D
    Pointcheval, D
    Pornin, T
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 477 - 493
  • [6] Neuromuscular Password-Based User Authentication
    Jiang, Xinyu
    Xu, Ke
    Liu, Xiangyu
    Dai, Chenyun
    Clifton, David A.
    Clancy, Edward A.
    Akay, Metin
    Chen, Wei
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (04) : 2641 - 2652
  • [7] PASTA: PASsword-based Threshold Authentication
    Agrawal, Shashank
    Miao, Peihan
    Mohassel, Payman
    Mukherjee, Pratyay
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2042 - 2059
  • [8] On Unlinkability of Password-Based Anonymous Authentication
    Shin, SeongHan
    Kobara, Kazukuni
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (06) : 1320 - 1324
  • [9] A Protocol to Strengthen Password-Based Authentication
    Sandoval, Itzel Vazquez
    Stojkovski, Borce
    Lenzini, Gabriele
    [J]. EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2018, 2018, 11263 : 38 - 46
  • [10] Cryptanalysis and Enhancement of a Password-Based Authentication Scheme
    Eldefrawy, Mohamed H.
    Al-Muhtadi, Jalal F.
    [J]. 2015 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2015, : 548 - 551