Browse > Article
http://dx.doi.org/10.13089/JKIISC.2009.19.6.23

Efficient RSA-Based PAKE Procotol for Low-Power Devices  

Lee, Se-Won (Graduate School of Information Management and Security, Korea University)
Youn, Taek-Young (Graduate School of Information Management and Security, Korea University)
Park, Yung-Ho (School of Computer Engineering, Sejong Cyber University)
Hong, Seok-Hie (Graduate School of Information Management and Security, Korea University)
Abstract
Password-Authenticated Key Exchange (PAKE) Protocol is a useful tool for secure communication conducted over open networks without sharing a common secret key or assuming the existence of the public key infrastructure (PKI). It seems difficult to design efficient PAKE protocols using RSA, and thus many PAKE protocols are designed based on the Diffie-Hellman key exchange (DH-PAKE). Therefore it is important to design an efficient PAKE based on RSA function since the function is suitable for designing a PAKE protocol for imbalanced communication environment. In this paper, we propose a computationally-efficient key exchange protocol based on the RSA function that is suitable for low-power devices in imbalanced environment. Our protocol is more efficient than previous RSA-PAKE protocols, required theoretical computation and experiment time in the same environment. Our protocol can provide that it is more 84% efficiency key exchange than secure and the most efficient RSA-PAKE protocol CEPEK. We can improve the performance of our protocol by computing some costly operations in offline step. We prove the security of our protocol under firmly formalized security model in the random oracle model.
Keywords
key exchange; password; authentication; RSA;
Citations & Related Records
연도 인용수 순위
  • Reference
1 P. MacKenzie, S. Patel, and R. Swaminathan, "Password-authenticated key exchange based on RSA," Advances in Cryptology, ASIACRYPT 2000 Proceedings, LNCS 1976, pp. 599-613, 2000
2 S.J. Park, J.H. Nam, S.J. Kim, and D.H. Won, "Efficient Password-Authenticated Key Exchange Based on RSA," CT-RSA, LNCS 4377, pp. 309–323, 2007
3 S.H. Shin, K. Kobara, and H. Imai, "RSA-based Password-Authenticated Key Exchange,Revisited," IEICE TRANSACTIONS on Information and Systems, vol. E91-D, no. 5, pp. 1424-1438, May 2008   DOI   ScienceOn
4 R. Gennaro and Y. Lindell, "A framework for password-based authenticated key exchange," Ad-vances in Cryptology - EUROCRYPT 2003 Proceedings, LNCS 2656, pp. 524-542, 2003
5 A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, 4th Ed., CRC Press, Oct. 1996
6 S. Bellovin and M. Merritt, "Augmented encrypted key exchange : A passwordbased protocol secure against dictionary attacks and password file compromise," Proc. of the 1st ACM Conference on Computer and Communications Security, ACM, pp. 244-250, Nov. 1993   DOI
7 M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attack," Advances in Cryptology - EUROCRYPT 2000 Proceedings, LNCS 1807, pp. 139-155, 2000
8 D. Catalano, D. Pointcheval, and T. Pornin, "Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication," IACR 2007, pp. 115-149, Jan. 2007   DOI
9 S. Lucks, "Open key exchange: How to defeat dictionary attacks without encrypting public keys," Proc. of Security Protocol Workshop, LNCS 1361, pp. 79-90, 1997
10 S. Bellovin and M. Merritt, "Encrypted key exchange : Password-based protocols secure against dictionary attacks," Proc. of the IEEE Symposium on Research in Security and Privacy, pp. 72-84, May 1992   DOI
11 F. Zhu, D.S. Wong, A.H. Chan, and R. Ye, "Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks," In Proc. of ISC 2002, LNCS 2433, pp. 150-161, 2002
12 D.M. Burton, Elementary number theory, 6th Ed., McGraw-Hill Higher Education, 2007
13 M. Zhang, "New approaches to password authenticated key exchange based on RSA," Proc. of Asiacrypt, LNCS 3329, pp. 230-244, 2004
14 D.S. Wong, A.H. Chan, and F. Zhu, "More Effcient Password Authenticated Key Exchange Based on RSA," In Proc. of INDOCRYPT 2003, LNCS 2904, pp. 375-387, 2003
15 T.Y. Youn, Y.H. Park, C.H. Kim, and J. Lim, "Weakness in a RSA-based password authenticated key exchange protocol," Inf. Process. Lett, vol. 108, no. 6, pp. 339-342, Nov. 2008   DOI   ScienceOn