Browse > Article

Elliptic Curve AMP Protocol  

Ahn, Chang-Sup ((주)정소프트 부설 연구소)
Heu, Shin (한양대학교 전자계산학과)
Abstract
Authentication and Key Agreement using password provide convenience and amenity, but what human can remember has extremely low entropy. To overcome its defects, AMP(Authentiration and key agreement via Memorable Password) which performs authentication and key agreement securely via low entropy password are presented. AMP uses Diffie-Hellman problem that depends on discrete logarithm problem. Otherwise, this thesis applies elliptic curve cryptosystem to AMP for further efficiency That is, this thesis presents EC-AMP(Elliptic Curve-AMP) protocol based on elliptic curve discrete logarithm problem instead of discrete logarithm problem, and shows its high performance through the implementation. EC-AMP secures against various attacks in the random oracle model just as AMP Thus, we nay supply EC-AMP to the network environment that requires authentication and key agreement to get both convenience and security from elliptic curve discrete logarithm problem.
Keywords
Authentication; Password; Elliptic Curve;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Teakyoung Kwon, 'Authentication and Key Agreement via Memorable Password,' IACR ePrint, 2000
2 Bruce Schneier, Applied Cryptography, pp.513-522, Wiley, 1995
3 Certicom Corp., 'Remarks on the security of the Elliptic curve cryptosystem,' http://www.certicom.com, 2000
4 Julio Lopez and Ricardo Dahab, 'Performance of Elliptic Curve Cryptosystems,' TR-IC-00-08, http://www.dcc.unicamp.br/ic-main/publications-e.html, 2000
5 S.Bellovin and M.Merritt, 'Encrypted Key Exchange: password-based protocols secure against dictionary attacks,' Proceeding of the 1992 IEEE Computer Society conference on Research in Security and Privacy, pp.72-84, 1992   DOI
6 Gareth Jones, 'Cryptography and Elliptic curves,' Project report of Univ. of Southampton, 1999
7 T.Wu, 'Secure Remote Password protocol,' Internet Society Symposium on Network and Distributed System Security, 1998
8 Alfred J. Menezes, Paul C.van Oorschot, and Scott A. Van stone, Handbook of Applied Cryptography, pp.49-125, CRC Press, 1997
9 Phil MacKenzie, 'More Efficient Password Authenticated Key Exchange,' RSA2001, 2001
10 Victor Boyko, Philip MacKenzie and Sarvar Patel, 'Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman,' Eurocrypt2000,, 2000
11 NIST, 'Recommended Elliptic Curves for federal government use,' 1999
12 Don Johnson and Alfred Menezes, 'The Elliptic curve Digtal Signature Algorithm,' TR-CORR 99-34, Dept of C&O, University of Waterloo, 1999
13 SKIP, 'Assigned Numbers for SKIP Protocols', http://www.skip.org, 1998