Browse > Article
http://dx.doi.org/10.13089/JKIISC.2002.12.1.33

A Method to Enhance the Security of ZKIP with Weak Keys and Its Application  

양대헌 (ETRI 정보보호연구본부)
Abstract
We present a systematic way to armor a zero-knowledge interactive proof based identification scheme that has badly chosen keys. Keys are sometimes mistakenly chosen to be weak(neither random nor long), and a weak key is often preferred to a strong key so that it might be easy for human to remember. Weak keys severely degrade the security of ZKIP based identification schemes. We show using off-line guessing attack how the weak key threats the security of ZlKIP based identification schemes. For the proper usage of ZKIP, we introduce a specialized form of ZKIP, which has a secret coin-tossing stage. Using the secret coin tossing, a secure framework is proposed for ZKIP based identification schemes with weak key in the ideal cipher model. The framework is very useful in password based authentication and key exchange protocol
Keywords
Zeroholedge interactive proof; authentication protocol; password; weak keys;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Probably Secure Password-Authenticated Key Exchange Using Diffie-Hellman /
[ V. Boyko;P. MacKenzie;S. Patel ] / Proceedings of Eurocrypt 2000. Lecture Notes in Computer Science
2 Fortifying key nrgotiation schems with poorly chosen passwords /
[ R. Anderson;T. Lomas ] / Electronics Letters   DOI   ScienceOn
3 Authenticated key exchange secure against directionary attacks /
[ M. Bellare;D. Pointcheval;P. Rogaway ] / Proceedings of Eurocrypt 2000, Lecture Notes in Computer Science
4 Efficient Identification and Signatures for Smart cards, Advances in Cryptology /
[ C. P. Schnorr ] / Proceedings of Crypto 89. Lecture Notes in Computer Science
5 Augmented encrypted key exchanges: a password based protocol secure against dictionary attacks and password file compromise /
[ S. Bellovin;M. Merrit ] / ACM Conference on Comp. and Comm. Security
6 Password-Authenticated Key Exchange Based on RSA /
[] / Proceedings of Asiacrypt 2000. Lecture Notes in Computer Science
7 Encrypted key exchange: password based protocols secure against directionary attacks /
[ S. Bellovin;M. Merri ] / IEEE Comp. Society Symp. on Research in Security and Privacy
8 Zero-knowledge proofs of identity /
[ U. Feige;A. Fiat;A. Shamir ] / Journal of Cryptology   DOI   ScienceOn
9 /
[ J. Pollard ] / Monte Carlo methods for index computation mod p. Mathematics of Computation
10 Strong password-only authenticated key exchange /
[ D. Jablon ] / ACM Comp. Comn. Review.   DOI   ScienceOn
11 New directions in cryptography /
[ W. Diffie;M. E. Hellman ] / IEEE Trans.
12 Time-stamps in Key Distribution Protocols /
[ D. E. Denning;G. M. Sacco ] / Communications of the ACM   DOI
13 Number Theoretic Attacks on Secure Password Schemes /
[ S. Patel ] / IEEE Symposium on Security and Privacy
14 Protocol fitted to security microprocessor minimizing both transmission and memory /
[ L. C. Guillou;J. J. Quisquater ] / Proceedings of EuroCrypt 88, Lecture Notes in Computer Science
15 Extended password Key Exchange Protocols Immune to Dictionary Attacks /
[ D. Jablon ] / Proc. of WET-ICE 97. IEEE Computer Society
16 Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords /
[ J. Katz;R. Ostrovsky;M. Yung ] / Proceedings of Eurocrypt 2001. Lecture Notes in Computer Science
17 A key distribution system equivalent to factoring /
[ K. McCurley ] / Journal of Cryptology   DOI   ScienceOn
18 An improved Algorithm for Computing Logarithms over GFp and its cryptographic significance /
[ S. Pohlig;M. Hellman ] / IEEE Trans.
19 Secure Remote Password Protocol /
[ T. Wu ] / Internet Society Symp. Network and Distributed System Security
20 On Diffie-Heilman key agreement with short exponents /
[ P. Van Oorschot;M. Wiener ] / Eurocrypt
21 Protecting poorly chosen sevrets from guessing attacks /
[ L. Gong;M. Lomas;R. Needham;J. Saltzer ] / IEEE Journal on Selected Area in Comn.   DOI   ScienceOn