期刊文献+

Simple Three-Party Password Authenticated Key Exchange Protocol 被引量:1

Simple Three-Party Password Authenticated Key Exchange Protocol
原文传递
导出
摘要 Three-party password authenticated key exchange (3PAKE) protocol plays a significant role in the history of secure communication area in which two clients agree a robust session key in an authentic manner based on passwords. In recent years, researchers focused on developing simple 3PAKE (S-3PAKE) protocol to gain system e?ciency while preserving security robustness for the system. In this study, we first demonstrate how an undetectable on-line dictionary attack can be successfully applied over three existing S-3PAKE schemes. An error correction code (ECC) based S-3PAKE protocol is then introduced to eliminate the identified authentication weakness. Three-party password authenticated key exchange (3PAKE) protocol plays a significant role in the history of secure communication area in which two clients agree a robust session key in an authentic manner based on passwords. In recent years, researchers focused on developing simple 3PAKE (S-3PAKE) protocol to gain system e?ciency while preserving security robustness for the system. In this study, we first demonstrate how an undetectable on-line dictionary attack can be successfully applied over three existing S-3PAKE schemes. An error correction code (ECC) based S-3PAKE protocol is then introduced to eliminate the identified authentication weakness.
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期600-603,共4页 上海交通大学学报(英文版)
基金 the National Science Council (Nos. NSC 99-2218-E-011-014 and NSC 100-2219-E-011-002)
关键词 authentication CRYPTANALYSIS error correction code (ECC) simple three-party password authenticated key exchange (S-3PAKE) security undetectable on-line dictionary attack authentication, cryptanalysis, error correction code (ECC), simple three-party password authenticated key exchange (S-3PAKE), security, undetectable on-line dictionary attack
  • 相关文献

参考文献8

  • 1Lu R X, CAO Z F. Simple three-party key exchange protocol [J]. Computers and Security, 2007, 26(1): 94- 97.
  • 2CHUNG H R, Ku W C. Three weaknesses in a sim- ple three-party key exchange protocol [J]. Information Sciences, 2008, 178(1): 220-229.
  • 3GUO H, LI Z J, Mu Y, et al. Cryptanalysis of simple three-party key exchange protocol [J]. Computers and Security, 2008, 2T(1-2): 16-21.
  • 4NAM J Y, PAIK J Y, KANG H K, et al. An off- line dictionary attack on a simple three-party key ex- change protocol [J]. IEEE Communications Letters, 2009, 13(3): 205-207.
  • 5IEEE Std 1451.2-1997.IEEE Standard for Smart Transducer Interface for Sensors and Actuators-Transducer to Microprocessor Communication Protocols and Transducer Electronic Data Sheet(TEDS)Formats.
  • 6DING Y, HOIZSTER P. Undetectable on-line password guessing attacks [J]. A CM SIGOPS Operating Systems Review, 1995, 29(4): 77-86.
  • 7CHIEN Hung-yu, LAIH Chi-sung. ECC-based lightweight authentication protocol with untrace- ability for low-cost RFID [J]. Journal of Parallel and Distributed Computing, 2009, 69(10): 848-853.
  • 8LIN S, COSTELLO D J. Error control coding: Funda- mentals and applications [M]. New Jersey: Prentice- Hall Press, 1983.

共引文献1

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部