期刊文献+

对客户到客户的口令认证密钥协商协议的密码分析和改进(英文) 被引量:1

Cryptanalysis and Improvement of Client-to-Client Password Authenticated Key Exchange Protocol
下载PDF
导出
摘要 大多数基于口令的密钥协商协议都只考虑如何在客户与服务器之间协商密钥.客户到客户口令认证密钥协商协议考虑如何在两个客户之间协商密钥,而这两个客户只分别与各自的服务器共享口令.在文献[1]中,Jin Wook Byun等提出了两个协议,分别称为跨域C2C-PAKE协议和单服务器C2C-PAKE协议.最近针对这两个协议,提出了一系列攻击和改进方案.在本文中,我们指出跨域C2C-PAKE协议及其所有的改进方案都是不安全的.我们设计了一个新的跨域C2C-PAKE协议.它可以抵抗已知的所有攻击. Most password-based key exchange protocols consider how to exchange a session key between a client and a server. Client-to-Client password authenticated key exchange protocol considers the scenario where two clients want to establish a session key, but they only share their passwords with their own servers. In Ref. [ 1 ], Jin Wook Byun et al proposed two such protocols called cross-realm C2C- PAKE and single-server C2C-PAKE. Recently, some flaws of these two protocols are found and some improvements are suggested. In this paper, we show that the cross-realm C2C-PAKE protocol and its all improved forms are still insecure. And we also present a new cross-realm C2C-PAKE protocol which is resistant to all known attacks.
作者 殷胤 李宝
出处 《中国科学院研究生院学报》 CAS CSCD 2006年第6期793-801,共9页 Journal of the Graduate School of the Chinese Academy of Sciences
基金 the National Natural Science Foundation of China(90304013)
关键词 口令 密钥协商 客户到客户 跨域 password, key exchange, client-to-client, cross realm
  • 相关文献

参考文献15

  • 1Byun JW,Jeong IR,Lee DH,et al.Password-authenticated key exchange between clients with different passwords.In:hfonnation and Communications Security-ICICS 2002,Springer,LNCS,2513:134~146
  • 2Diffie W,Hellman ME.New directions in cryptography.IEEE Transactions on Information Theory,1976,22(6):644~654
  • 3Bellovin SM,Merritt M.Encrypted key exchange:Password-based protocols secure against dictionary attacks.In:Proceedings of the 1992 IEEE Symposium on Security and Privacy,IEEE Computer Society Press,1992,72~84
  • 4Boyko V,MacKenzie PD,Patel S.Provably secure password-authenticated key exchange using diffie-hellman.In:Advances in Cryptology-EUROCRYPT 2000,Springer,LNCS,1807:156~171
  • 5MacKenzie PD.More efficient password-authenticated key exchange.In:Topics in Cryptology-CT-RSA 2001,Springer,LNCS,2020:361~377
  • 6MacKenzie PD.The pak suite:Protocols for password-authenticated key exchange.In:Submission to IEEE P1363.2,2002
  • 7Bellare M,Rogaway P.The autha protocol for password-based authenticated key exchange.In:Contribution to the IEEE P1363 study group,2000
  • 8Bresson E,Chevassut O,Pointcheval D.Security proofs for an efficient password-based key exchange.In:Proceedings of the 10th ACM Conference on Computer and Communications Security-CCS 2003,ACM,2003,241~250
  • 9Bresson E,Chevassut O,Pointcheval D.New security results on encrypted key exchange.In:Public Key Cryptography-PKC 2004,Springer,LNCS,2947:145~158
  • 10Abdalla M,Chevassut O,Pointcheval D.One-time verifier-based encrypted key exchange.In:Public Key Cryptography-PKC 2005,Springer,LNCS,3386:47~64

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部