Extending the Password-based Authentication Protocol K1P

패스워드 기반 인증 프로토콜 K1P의 확장

  • 권태경 (연세대학교 컴퓨터공학과) ;
  • 송주석 (연세대학교 컴퓨터공학과)
  • Published : 1998.07.01

Abstract

We summarize the password-based authetication protocol K1P which was introduced in our easlier papers [1,2] and then propose three more extended protocols. These protocols preserve a design concept of K1P, i.e., security and efficiency, and canbe used for various purposes. They are a One-time key K1P, a Client public key K1P, and an Exponential key exchange K1P.

본 논문에서는 선행 논문인 [1]과 [2]에서 제안한 바 있는 패스워드 기반 인증 프로토콜 K1P의 특징을 요약하고 세가지의 확장된 프로토콜을 제안한다. 제안된 프로토콜들은 K1P의 설계 개념인 안전성과 효율성을 유지하도록 하였으며, 각기 다양한 목적에 따라 사용될 수 있도록 하였다. 새롭게 제안된 프로토콜은 일시 키-K1P, 사용자 공개키-K1P, 그리고 지수적 키 교환-K1P, 그리고 지수적 키 교환-K1P 등이다.

Keywords

References

  1. 한국정보과학회 논문지(A) 추측 공격에 대해서 안전하고 효율적인 패스워드 기반 프로토콜의 설계 및 검증 권태경;송주석
  2. Proceedings of IEEE INFOCOM'97 An Adaptable and Reliable Authentication Protocol for Communic-ation Networks T.K. K won;M. H. Kang
  3. IEEE Transactions on Information Theory v.22 no.3 W. Diffie;M. Hellman
  4. Communication of the ACM v.21 no.12 Using Encryption For Authentication in Large Networks of Computers R. Needham;M. Schroeder
  5. Communications of ACM v.24 no.8 Timestamps in Key Distri-bution Protocols D. Denning;G. Sacco
  6. ACM Operating Systems Review v.21 no.1 Efficient and Timely Mutual Authentications D.Otway;O.Rees
  7. Communications of the ACm v.22 no.11 Password Security: A Case History R. Morris; K. Thompson
  8. Proceeding fo Crypto'89, pub-lished as Lecture Notes in Computer Science no.435 UNIX Password Security -Ten Years Later D.C.Feldmeier
  9. Proceedings of the 12th ACM Symposium on Operating System Principles, ACM Operating Systems Review v.23 no.5 Reducing Risks from Pooly Chosen Keys M.Lomas;L.Gong;J.Saltzer;R.Needham
  10. Proceeding fo IEEE INFOCOM'90 Verifiable Attacks in Cryptographic Protocols L.Gong
  11. Proceedings of the IEEE Sympo-sium on Security and Privacy Encrypted Key Exchange:Password-Based Protocols Secure Against Diction-ary Attacks S.Bellovin;M.Merrit
  12. IEEE Journal on Selected Areas in Communications v.11 no.5 Pro-tecting PoorlyChosen Secrets from Guessing At-tacks L.Gong;M.Lomas;R.Needham
  13. 1993 IEEE Symposium on Reliable Distributed Systems Some Remarks on Protecting Weak Keys and Poorly-Chosen Se-crets from Guessing Attacks G.Tsudik;E.Van Herreweghen
  14. ACM Operating System Review v.29 no.3 Refinement and extension of Encrypted Key Exchange M,Steiner;G.Tsudik;M.Waidner
  15. Proceedings of the 8th IEEE Computer Security Foundations Workshop Optimal Authentication Protocols Resis-tant to Password Guessing Attacks L.Gong
  16. ACM Operating Systems Re-view v.29 no.4 Undetectable On-line Password Guessing Attacks Y.Ding;P.Horster
  17. Proceedings of the IEEE Symposium on Research in Security and Privacy Reasoning about Belief in Cryptographic Protocols L.Gong;R.Needham;R.Yahalom
  18. Applied Cryptography (2nd Ed.) B.Schneier