Method to Obtain Asymmetric Authenticated Key Exchange Protocols from Symmetric Ones

대칭형 인증 및 키 교환 프로토콜을 이용한 비대칭형 프로토콜의 설계 기법

  • 양대헌 (인하대학교 정보통신대학원)
  • Published : 2004.04.01

Abstract

Password authenticated key exchange protocols for the symmetric model are easier to design, analyze and are more efficient than ones for the asymmetric model, but they are most likely to be broken by server's compromise. Though the protocols with provable security for the asymmetric model such as PAK-X and SNAPI-X are introduced, they need large amount of computation compared with the standard Diffie-Hellman key exchange. We present a systematic and efficient way to transform password authenticated key exchange protocols for the symmetric model into protocols for the asymmetric model. Thus, an efficient protocol for the asymmetric model can be constructed by a systematic protocol with low computation.

대칭형 패스워드 기반의 인증 및 키교환 프로토콜은 비대칭형 프로토콜보다 설계, 분석, 효율면에서 더 좋은 성질을 가진다. 하지만, 인증 서버가 공격당하는 경우 대칭형 인증 프로토콜은 쉽게 사용자의 패스워드가 노출된다. 비대칭형의 안전성 증명을 가지는 PAK-X나 SNAPI-X같은 프로토콜이 제안되었지만, Diffie-Hellman 키교환에 비해 많은 연산을 필요로 하고 있다. 이 논문에서는 패스워드 기반의 대칭형 인중 및 키교환 프로토콜을 비대칭형 프로토콜로 변환하는 효율적인 방법을 제시한다.

Keywords

References

  1. S. Bellovin and M. Merrit, 'Encrypted key exchange: password based protocols secure against dictionary attacks,' IEEE Comp. Society Symp. on Research in Security and Privacy, 1992, pp. 7284 https://doi.org/10.1109/RISP.1992.213269
  2. D. Jablon, 'Strong password-only authenticated key exchange,' ACM Comp. Comm. Review, 1996, Vol. 26, No. 5, pp. 526 https://doi.org/10.1145/242896.242897
  3. S. Bellovin and M. Merrit, 'Augmented encrypted key exchange: a password based protocol secure against dictionary attacks and passwrod file compromise,' ACM Conference on Comp. and Comm. Security, 1993, pp. 244-250 https://doi.org/10.1145/168588.168618
  4. D. Jablon, 'Extended Password Key Exchange Protocols Immune to Dictionary Attacks,' Proc. of WET-ICE '97, IEEE Computer society, June, 1997, Cambridge, MA, pp. 248-255 https://doi.org/10.1109/ENABL.1997.630822
  5. T. Wu, 'Secure Remote Password Protocol,' Internet Society Symp. Network ad Distributed System Security, 1998
  6. M. Bellare, D. Pointcheval and P. Rogaway, 'Authenticated key exchange secure against dictionary attacks,' Proceedings of EuroCrypt 2000, Lecture Notes in Computer Science, Springer-Verlag, 2000, pp. 139-155
  7. V. Boyko, P. Mackenzie and S. Patel, 'Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman,' Proceedings of EuroCrypt 2000, Lecture Notes in Computer Science, Springer-Verlag, 2000, pp. 156-171
  8. P. MacKenzie, S. Patel and R. Swaminathan, 'Password-Authenticated Key Exchange Based on RSA,' Proceedings of Asiacrypt 2000, Lecture Notes in Computer Science, Springer-Verlag, 2000, pp. 599-613
  9. J. Katz, R. Ostrovsky and M. Yung, 'Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords,' Proceedings of Euro-crypt 2001, Lecture Notes in Computer Science, Springer-Verlag, 2001, pp. 475-494
  10. U. Feige, A. Fiat and A. Shamir, 'Zero-knowledge proofs of indentity,' Journal of Cryptology, Vol. 1, No. 2, 1988, pp. 77-94 https://doi.org/10.1007/BF02351717
  11. L.C. Guillou and J.J. Quisquater, 'Protocol fitted to security microprocessor minimizing both transmission and memory,' Proceedings of EuroCrypt 88, Lecture Notes in Computer Science, Springer-Verlag, 1988, pp. 123-128 https://doi.org/10.1007/3-540-45961-8_11
  12. C.P. Schnorr, Efficient Identification and Signatures for Smart cards, Advances in Cryptology : Proceedings of Crypt 89, Lecture Notes in Computer Science, Springer-Verlag, New York, 1989, pp. 239-251