Abstract
With the advancement of wireless technology and the increasing demand for resource-constrained mobile devices, secure and efficient password authenticated key exchange (PAKE) protocols are needed for various kinds of secure communications among low-power wireless devices. In this paper, we introduce an elliptic curve based password-keyed permutation family and use it to construct a PAKE in such a way that it is suitable for efficient implementation on low-power devices. The computation time on each side of our PAKE is estimated to be about 3.4 seconds and can be reduced to 1.5 seconds with precomputation on an embedded device with a low-end 16MHz DragonBall-EZ microprocessor. On its security, we show that the password-keyed permutation family is secure against offline dictionary attack under the assumption that the elliptic curve computational Diffie-Hellman problem is intractable.
Index Terms: Authentication Protocol, Key Exchange, Wireless Communications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, p. 139. Springer, Heidelberg (2000)
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: First ACM Conference on Computer and Communications Security, pp. 62–73. ACM Press, New York (1993)
Bellovin, S.M., Merritt, M.: Encrypted key exchange: Password based protocols secure against dictionary attacks. In: Proceedings 1992 IEEE Symposium on Research in Security and Privacy, pp. 72–84. IEEE Computer Society, Los Alamitos (1992)
Gong, L., Lomas, M., Needham, R., Saltzer, J.: Protecting poorly chosen secrets from guessing attacks. IEEE J. on Selected Areas in Communications 11(5), 648–656 (1993)
IEEE. P1363 - 2000: Standard Specifications For Public Key Cryptography (2000)
IEEE. P1363.2 / D15: Standard Specifications for Password-based Public Key Cryptographic Techniques (May 2004)
Jablon, D.: Strong password-only authenticated key exchange. Computer Communication Review, ACM 26(5), 5–26 (1996)
Jablon, D.: Extended password key exchange protocols immune to dictionary attack. In: Proc. of the WETICE 1997 Workshop on Enterprise Security, Cambridge, MA, USA (June 1997)
Kobara, K., Imai, H.: Pretty-simple password-authenticated key-exchange under standard assumptions. IEICE Trans. E85-A(10), 2229–2237 (2002)
MacKenzie, P.: More efficient password-authenticated key exchange. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, p. 361. Springer, Heidelberg (2001)
MacKenzie, P., Patel, S., Swaminathan, R.: Password-authenticated key exchange based on RSA. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 599–613. Springer, Heidelberg (2000)
Ueli, M.: Maurer and Stefan Wolf. The Diffie-Hellman protocol. Designs, Codes and Cryptography 19, 147–171 (2000)
Menezes, A.: Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, Dordrecht (1993)
Wang, Y.: EC-SRP. Submission to IEEE P1363 Study Group, June 2001, updated May 2002 (May 2002)
Weimerskirch, A., Paar, C., Chang Shantz, S.: Elliptic curve cryptography on a Palm OS device. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 502–513. Springer, Heidelberg (2001)
Wong, D., Chan, A., Zhu, F.: More efficient password authenticated key exchange based on RSA. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol. 2904, pp. 375–387. Springer, Heidelberg (2003)
Wu, T.: The secure remote password protocol. In: 1998 Internet Society Symposium on Network and Distributed System Security, pp. 97–111 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wong, D.S., Chan, A.H., Zhu, F. (2005). Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract). In: Lorenz, P., Dini, P. (eds) Networking - ICN 2005. ICN 2005. Lecture Notes in Computer Science, vol 3421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31957-3_93
Download citation
DOI: https://doi.org/10.1007/978-3-540-31957-3_93
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25338-9
Online ISBN: 978-3-540-31957-3
eBook Packages: Computer ScienceComputer Science (R0)