Browse > Article

A Client/Sever Authenticated Key Exchange Protocol using Shared Password  

류은경 (경북대하교 컴퓨터공학과)
윤은준 (경북대하교 컴퓨터공학)
유기영 (경북대하교 컴퓨터공학과)
Abstract
In this paper, we propose a new authenticated key exchange protocol in which client and sever can mutually authenticate and establish a session key over an insecure channel using only a human memorable password. The proposed protocol is based on Diffie-Hellman scheme and has many of desirable security attributes: It resists off-line dictionary attacks mounted by either Passive or active adversaries over network, allowing low-entropy Passwords to be used safely. It also offers perfect forward secrecy, which protects past sessions when passwords are compromised. In particular, the advantage of our scheme is that it is secure against an impersonation attack, even if a server's password file is exposed to an adversary. The proposed scheme here shows that it has better performance when compared to the previous notable password-based key exchange methods.
Keywords
Password; Authentication; Key Exchange/Agreement; Diffie-Hellman;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Blake-Wilson, A. Menezes, Authenticated Diffie Hellman key agreement protocols, Proceedings of the 5th Annual Workshop on Selected Areas in Cryptography (SAC '98), LICS Vol. 1556, pp. 339-361, 1999
2 S. Bellovin and M. Merritt, Encrypted key exchange: Password-based protocols secure aganist dictionary attacks, In IEEE Symposium on Research in Security and Privacy, pp.72-84, 1992   DOI
3 D. Jablon, Strong Password-Only Authenticated Key Exchange,Computer Communication Review, ACM SIGCOMM, vol. 26, no. 5, pp.5-26, 1996   DOI
4 T. Wu, Secure remote password protocol, Internet Society Symposium on Network and Distributed System Security, 1998
5 T. Kwon, Ultimate solution to authentication via memorable password, Contri- bution to the IEEE P1363 study group for Future PKC Standards, available from http://grouper.ieee.org/groups/1363/passwdPK/contributions.html 2000
6 L. Law, A. Menezes, M. Qu, J. Solinas and S. Vanstone, An efficient protocol for authenticated key agreement, Designs, Codes and Cryptography, pp. 119-134, 2003   DOI
7 D. Jablon, Extended password key exchange protocols immune to dictionary attack, WETICE Workshop, pp.248-255, 1997   DOI
8 P. MacKenzie, More Efficient Password Authenticated Key exchange, CT-RSA, LNCS Vol. 2020, pp.361-377, 2001
9 W. Diffie, M. Hellman, New directions in cryptography, IEEE Transaction on Information Theory, IT-22, pp.644-654, 1976   DOI
10 D. Johnson and S. Blake-Wilson and A. Menezes, Key agreement protocols and their security analysis, Proceedings of the Sixth IMA international Conference on Cryptography and Coding, LNCS Vol. 1355 pp. 30-45, 1997
11 L. Gong, M. Lomas, R. Needham, and J. Saltzer, Protecting poorly chosen secrets from guessing attacks, IEEE Journal on Selected Areas in Communications, pp 648-656, 1993   DOI   ScienceOn
12 M. Bellare and P.Rogaway, Entity Authentication and Key Distribution, In Proc. of Crypto '93, LNCS Vol. 773, pp. 232-249, 1993
13 V. Boyko, P. Mackenzie and S. Patel, Provably secure password authenticated key exchange using diffie-Hellman, In Proc. of EuroCrypt 2000, pp.156-171, 2000
14 D. Denning and G. Sacco, Timestamps in key distrobution systems, Communications of the ACM, 1981