Abstract
We propose the efficient password-based key exchange protocol, which resists against dictionary attack mounted by a passive or active adversary and is a 3-pass key exchange protocol, whereas existing protocols are 4-pass or more. Thus, considering network traffic, it will be able to reduce the total execution time in comparison with other several schemes. Especially, from the view point of the client’s computational cost, our protocol is suitable for mobile communications. It is because we can reduce the modular exponentiation of client (or mobile) in comparison with other several password-based protocols. Besides, the proposed scheme has the characteristics of perfect forward secrecy, and resists against a known key attack. It also offers resistance against a stolen verifier attack as A-EKE, B-SPEKE, and SRP. Finally, two parties involved in protocol are able to agree on Diffie-Hellman exponential gxy in the proposed scheme.
This work was supported by KSEF (Korea Science and Engineering Foundation) under project 97-01-13-01-05.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bellovin, S., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: IEEE Comp. Society Symp. On Research in Security and Privacy, pp. 72–84 (1992)
Bellovin, S., Merrit, M.: Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise. In: ACM Conf. Comp. And Comm. Security, pp. 244–250 (1993)
Jablon, D.: Strong password-only authenticated key exchange. ACM Comput. Commun. Rev. 20(5), 5–26 (1996)
Jablon, D.: Extended password key exchange protocols. In: WETICE Workshop on Enterprise Security (1997)
Wu, T.: Secure remote password protocol. In: Internet Society Symp. Network and Distributed System Security (1998)
Kwon, T., Song, J.: Secure agreement scheme for gxy via password authentication. Electron. Lett. 35, 892–893 (1999)
Nyberg, K., Rueppel, R.: A new signature scheme based on DSA giving message recovery. In: Nyberg, K., Rueppel, R. (eds.) Proc. 1st ACM Conf. On Comput. Commun. Security, November 1993, pp. 58–61 (1993)
Boyd, C., Mathuria, A.: Key Establishment Protocols for Secure Mobile Communications: A Selective Survey. In: Eiben, A.E., Bäck, T., Schoenauer, M., Schwefel, H.-P. (eds.) PPSN 1998. LNCS, vol. 1498, pp. 344–355. Springer, Heidelberg (1998)
Menezes, A.J., vanOorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography, pp. 388–397. CRC Press, Boca Raton (1996)
Gong, L., Lomas, M.A., Needham, R., Saltzer, J.: Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Communications 11(5), 648–656 (1993)
Steiner, M., Tsudik, G., Waidner, M.: Refinement and Extension of Encrypted Key Exchange. Operating Systems Review 29(3), 22–30 (1995)
Anderson, R., Vaudenay, S.: Minding your p’s and q’s’. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 15–25. Springer, Heidelberg (1996)
van Oorschot, P.C., Wiener, M.J.: On Diffie-Hellman Key Agreement with Short Exponents. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 332–343. Springer, Heidelberg (1996)
Pohlig, S.C., Hellman, M.E.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans. Inform. Theory IT-24(1), 106–110 (1978)
Denning, D.E., Sacco, G.M.: Timestamps in key distribution protocols. Communications of the ACM 24(8), 533–536 (1981)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, H., Sohn, K., Yang, H., Won, D. (2000). Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client. In: Song, J. (eds) Information Security and Cryptology - ICISC’99. ICISC 1999. Lecture Notes in Computer Science, vol 1787. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10719994_12
Download citation
DOI: https://doi.org/10.1007/10719994_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67380-4
Online ISBN: 978-3-540-45568-4
eBook Packages: Springer Book Archive