Skip to main content

More Efficient Password-Authenticated Key Exchange

  • Conference paper
  • First Online:
Book cover Topics in Cryptology — CT-RSA 2001 (CT-RSA 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2020))

Included in the following conference series:

Abstract

In this paper we show various techniques for improving the efficiency of the PAK and PAK-X password-authenticated key exchange protocols while maintaining provable security. First we show how to decrease the client-side computation by half in the standard PAK protocol (i.e., PAK over a subgroup of Z * p . Then we show a version of PAK that is provably secure against server compromise but is conceptually much simpler than the PAK-X protocol. Finally we show how to modify the PAK protocol for use over elliptic curve and XTR groups, thus allowing greater efficiency compared to running PAK over a subgroup of Z * p .

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In EUROCRYPT2000, pages 139–155.

    Google Scholar 

  2. M. Bellare and P. Rogaway. Entity authentication and key distribution. In CRYPTO’ 93, pages 232–249.

    Google Scholar 

  3. M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM Security’ 93, pages 62–73.

    Google Scholar 

  4. M. Bellare and P. Rogaway. Optimal asymmetric encryption. In EUROCRYPT 94, pages 92–111.

    Google Scholar 

  5. S. M. Bellovin and M. Merritt. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In IEEE Security 92, pages 72–84.

    Google Scholar 

  6. S. M. Bellovin and M. Merritt. Augumented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise. In ACM Security’ 93, pages 244–250.

    Google Scholar 

  7. D. Bleichenbacher, 2000. Personal Communication.

    Google Scholar 

  8. V. Boyko, P. MacKenzie, and S. Patel. Provably-secure password authentication and key exchange using Diffie-Hellman. In EUROCRYPT 2000, pages 156–171.

    Google Scholar 

  9. R. Canetti, O. Goldreich, and S. Halevi. The random oracle methodology, revisited. In STOC’ 98, pages 209–218.

    Google Scholar 

  10. L. Gong. Optimal authentication protocols resistant to password guessing attacks. In 8th IEEE Computer Security Foundations Workshop, pages 24–29, 1995.

    Google Scholar 

  11. L. Gong, T. M. A. Lomas, R. M. Needham, and J. H. Saltzer. Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Communications, 11(5): 648–656, June 1993.

    Article  Google Scholar 

  12. IEEE. IEEE1363, “Standard Specifications for Public Key Cryptography”, 2000.

    Google Scholar 

  13. D. Jablon. Strong password-only authenticated key exchange. ACM Computer Communication Review, ACM SIGCOMM, 26(5):5–20, 1996.

    Article  Google Scholar 

  14. D. Jablon. Extended password key exchange protocols immune to dictionary attack. In WETICE’97 Workshop on Enterprise Security, 1997.

    Google Scholar 

  15. J. Kilian, E. Petrank, and C. Rackoff. Lower bounds for zero knowledge on the internet. In FOCS’ 98, pages 484–492.

    Google Scholar 

  16. A. Lenstra and E. Verheul. Key improvements to XTR. In ASIACRYPT 2000, page to appear.

    Google Scholar 

  17. A. Lenstra and E. Verheul. The XTR public key system. In CRYPTO 2000, pages 1–18.

    Google Scholar 

  18. S. Lucks. Open key exchange: How to defeat dictionary attacks without encrypting public keys. In Proceedings of the Workshop on Security Protocols, 1997.

    Google Scholar 

  19. P. MacKenzie, S. Patel, and R. Swaminathan. Password-authenticated key exchange based on RSA. In ASIACRYPT 2000, page to appear.

    Google Scholar 

  20. M. Roe, B. Christianson, and D. Wheeler. Secure sessions from weak secrets. Technical report, University of Cambridge and University of Hertfordshire, 1998.

    Google Scholar 

  21. V. Shoup. On formal models for secure key exchange. In ACM Security’ 99.

    Google Scholar 

  22. M. Steiner, G. Tsudik, and M. Waidner. Refinement and extension of encrypted key exchange. ACM Operating System Review, 29:22–30, 1995.

    Article  Google Scholar 

  23. U.S. Department of Commerce/N.I.S.T., Springfield, Virginia. FIPS186, ”Digital Signature Standard”, Federal Information Processing Standards Publication 186, 1994.

    Google Scholar 

  24. T. Wu. The secure remote password protocol. In NDSS’ 98, pages 97–111.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

MacKenzie, P. (2001). More Efficient Password-Authenticated Key Exchange. In: Naccache, D. (eds) Topics in Cryptology — CT-RSA 2001. CT-RSA 2001. Lecture Notes in Computer Science, vol 2020. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45353-9_27

Download citation

  • DOI: https://doi.org/10.1007/3-540-45353-9_27

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41898-6

  • Online ISBN: 978-3-540-45353-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics