| Literature DB >> 25258723 |
Junghyun Nam1, Kim-Kwang Raymond Choo2, Minkyu Park1, Juryon Paik3, Dongho Won3.
Abstract
Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.Entities:
Mesh:
Year: 2014 PMID: 25258723 PMCID: PMC4165805 DOI: 10.1155/2014/479534
Source DB: PubMed Journal: ScientificWorldJournal ISSN: 1537-744X
Figure 1The S-EA-3PAKE protocol according to Lee and Hwang [4].
Establishing the secret keys k and k in the S-EA-3PAKE protocol.
|
|
|
|---|---|
|
|
|
Figure 2Our improved three-party PAKE protocol.
Establishing the secret keys k and k in our improved protocol.
|
|
|
|---|---|
|
|
|