A secure two-party password-authenticated key exchange protocol

Maryam Saeed, H. Shahhoseini, Ali Mackvandi, Mohammad Reza Rezaeinezhad, Mansour Naddafiun, M. Bidoki
{"title":"A secure two-party password-authenticated key exchange protocol","authors":"Maryam Saeed, H. Shahhoseini, Ali Mackvandi, Mohammad Reza Rezaeinezhad, Mansour Naddafiun, M. Bidoki","doi":"10.1109/IRI.2014.7051926","DOIUrl":null,"url":null,"abstract":"PAKE protocols which stands for Password Authenticated Key Exchange are of great importance for providing secure communications over the Internet. They permit two entities to share a session key in an authentic manner based on a human-memorable password. In 2006, Kolesnikov and Rackoff proposed an improvement to the Halevi and Krawczyk's PAKE protocols. In 2010, they revised their preceding protocol and introduced an improvement to it. In this paper, it is shown that not only are Halevi and Krawczyk's PAKE protocols vulnerable to ephemeral key compromise impersonation and malicious server attacks, but they also fail to provide key confirmation property simultaneously, one of which does not even satisfy Forward Secrecy attribute. It is also shown that Kolesnikov and Rackoffs protocols are susceptible to ephemeral key compromise impersonation and to Denial-of-Service (DoS) attacks, nor do they satisfy Forward Secrecy, mutual authentication, and key confirmation attributes. Additionally, they are prone to the disclosure of pre-shared secret key. Two improved protocols, called S2PAKEvl and S2PAKEv2, are also proposed providing several security attributes, both of which are still efficient. S2PAKEvl has two rounds with mutual authentication and not providing key confirmation, while S2PAKEv2 is of three rounds holding mutual authentication and key confirmation.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IRI.2014.7051926","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

PAKE protocols which stands for Password Authenticated Key Exchange are of great importance for providing secure communications over the Internet. They permit two entities to share a session key in an authentic manner based on a human-memorable password. In 2006, Kolesnikov and Rackoff proposed an improvement to the Halevi and Krawczyk's PAKE protocols. In 2010, they revised their preceding protocol and introduced an improvement to it. In this paper, it is shown that not only are Halevi and Krawczyk's PAKE protocols vulnerable to ephemeral key compromise impersonation and malicious server attacks, but they also fail to provide key confirmation property simultaneously, one of which does not even satisfy Forward Secrecy attribute. It is also shown that Kolesnikov and Rackoffs protocols are susceptible to ephemeral key compromise impersonation and to Denial-of-Service (DoS) attacks, nor do they satisfy Forward Secrecy, mutual authentication, and key confirmation attributes. Additionally, they are prone to the disclosure of pre-shared secret key. Two improved protocols, called S2PAKEvl and S2PAKEv2, are also proposed providing several security attributes, both of which are still efficient. S2PAKEvl has two rounds with mutual authentication and not providing key confirmation, while S2PAKEv2 is of three rounds holding mutual authentication and key confirmation.
一个安全的双方密码认证密钥交换协议
PAKE协议,即密码认证密钥交换协议,对于提供互联网上的安全通信非常重要。它们允许两个实体基于人类可记忆的密码以可信的方式共享会话密钥。2006年,Kolesnikov和Rackoff提出了对Halevi和Krawczyk的PAKE协议的改进。2010年,他们修改了之前的协议,并对其进行了改进。本文证明Halevi和Krawczyk的PAKE协议不仅容易受到临时密钥泄露冒充和恶意服务器攻击,而且它们不能同时提供密钥确认属性,其中一个甚至不满足前向保密属性。研究还表明,Kolesnikov和rackoff协议容易受到临时密钥泄露模拟和拒绝服务(DoS)攻击的影响,它们也不满足前向保密、相互认证和密钥确认属性。此外,它们还容易泄露预共享密钥。还提出了两个改进的协议,称为S2PAKEvl和S2PAKEv2,它们提供了几个安全属性,这两个协议仍然是有效的。S2PAKEvl有两轮相互认证,不提供密钥确认,而S2PAKEv2有三轮相互认证和密钥确认。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信