Augmented encrypted key exchange using RSA encryption

A. Barmawi, Shingo Takada, N. Doi
{"title":"Augmented encrypted key exchange using RSA encryption","authors":"A. Barmawi, Shingo Takada, N. Doi","doi":"10.1109/PIMRC.1997.631052","DOIUrl":null,"url":null,"abstract":"The augmented encrypted key exchange (A-EKE) uses a shared secret key for encryption. The A-EKE uses the hash of sender's password as the shared secret key. By using Simmon's attack the sender's password can be broken. If this is accomplished, the attacker is able to know the communicating parties session key used after authentication as well as in the authentication of the sender. Furthermore, using the broken session key and the password, the attacker can impersonate the real sender. To prevent this from happening, we propose a method to keep the session key and sender's password secret even if the attacker can break the shared secret key. This is accomplished by using RSA encryption. In our proposed scheme we use public keys which will be kept by the communicating parties and will be exchanged indirectly, i.e. instead of sending the whole public key the two parties will send the number which determines their public key, along with the shared key.","PeriodicalId":362340,"journal":{"name":"Proceedings of 8th International Symposium on Personal, Indoor and Mobile Radio Communications - PIMRC '97","volume":"64 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1997-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of 8th International Symposium on Personal, Indoor and Mobile Radio Communications - PIMRC '97","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PIMRC.1997.631052","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

The augmented encrypted key exchange (A-EKE) uses a shared secret key for encryption. The A-EKE uses the hash of sender's password as the shared secret key. By using Simmon's attack the sender's password can be broken. If this is accomplished, the attacker is able to know the communicating parties session key used after authentication as well as in the authentication of the sender. Furthermore, using the broken session key and the password, the attacker can impersonate the real sender. To prevent this from happening, we propose a method to keep the session key and sender's password secret even if the attacker can break the shared secret key. This is accomplished by using RSA encryption. In our proposed scheme we use public keys which will be kept by the communicating parties and will be exchanged indirectly, i.e. instead of sending the whole public key the two parties will send the number which determines their public key, along with the shared key.
增强加密密钥交换使用RSA加密
增强加密密钥交换(a - eke)使用共享密钥进行加密。A-EKE使用发送方密码的哈希值作为共享密钥。通过使用西蒙的攻击,发件人的密码可以被破解。如果做到了这一点,攻击者就能够知道在身份验证之后以及在发送方身份验证中使用的通信方会话密钥。此外,攻击者可以使用破解的会话密钥和密码来冒充真实的发送者。为了防止这种情况发生,我们提出了一种方法,即使攻击者可以破解共享密钥,也可以保持会话密钥和发送方密码的机密性。这是通过使用RSA加密来实现的。在我们提出的方案中,我们使用由通信双方保存并间接交换的公钥,即双方将发送决定其公钥的数字以及共享密钥,而不是发送整个公钥。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信