Browse > Article

A Password-based Efficient Key Exchange Protocol  

이성운 (경북대학교 컴퓨터공학과)
김현성 (경일대학교 컴퓨터공학)
유기영 (경북대학교 컴퓨터공학과)
Abstract
In this paper, we propose a new key exchange protocol which authenticates each other and shares a session key between a user and a server over an insecure channel using only a small password. The security of the protocol is based on the difficulty of solving the discrete logarithm problem and the Diffie-Hellman problem and the cryptographic strength of hash function. The protocol is secure against the man-in-the-middle attack, the password guessing attack, the Denning-Sacco attack, and the stolen-verifier attack, and provide the perfect forward secrecy. Furthermore, it is more efficient than other well-known protocols in terms of protocol execution time because it could be executed in parallel and has a simple structure.
Keywords
cryptography; key agreement; key exchange; password; authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 T. Wu. 'Secure remote password protocol,' Internet Society Symposium on Network and Distributed System Security, 1998
2 P. MacKenzie, S. Patel, and R. Swaminathan. 'Password-authenticated key exchange based on RSA.' In ASIACRYPT2000
3 M. Bellare and P. Rogaway, 'The AuthA protocol for password-based authenticated key exchange,' Presented to IEEE P1363a, March 2000
4 W. Diffie, M. E. Hellman, 'New directions in cryptography,' IEEE Transactions on Information Theory, Vol.IT-22, No.6, pp.644-654, 1976   DOI
5 D. R. Stinson, Cryptography Theory and Practice, CRC, 1995
6 M. Bellare and P. Rogaway, 'Random oracles are practical: A paradigm for designing efficient protocols,' In ACM security 93, pp.62-73, 1993   DOI
7 M. Bellare and P. Rogaway, 'Entity Authentication and Key Distribution,' Advances in Cryptology-CRYPTO'93, Vol. 773, pp.232-249, 1994
8 IEEE. Standard Specifications for Public Key Cryptography, IEEE1363, 2002
9 V. Boyko, P. MacKenzie and S. Patel. 'Provably Secure Password- Authenticated Key Exchange Using Diffie-Hellman,' Advances in Cryptology-EUROCRYPT'2000, pp. 156-171, 2000
10 T. Kwon. 'Ultimate Solution to Authentication via Memorable Password,' Presented to IEEE P1363a, May 2000
11 D. Jablon. 'Extended password key exchange protocols,' WETICE Workshop on Enterprise Security, 1997