Skip to main content

Weaknesses of “Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol”

  • Conference paper
Data and Knowledge Engineering (ICDKE 2012)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7696))

Included in the following conference series:

Abstract

The three-party password-based authenticated key exchange (3PAKE) protocol allows two users to share a session key for future communication with the help of a trusted server in the public network. Recently, Zhao et al. [Zhao J., Gu D., Zhang L., Security analysis and enhancement for three-party password-based authenticated key exchange protocol, Security Communication Networks 2012; 5(3):273-278] proposed an efficient 3PAKE protocol using smart cards. They proved that their protocol can withstand various known attacks found in the previously published schemes. However, in this paper, we point out that their protocol is vulnerable to three kinds of attacks namely, off-line password-guessing attack, privileged insider attack and stolen smart card attack. Hence, Zhao et al.’s scheme is not recommended for practical applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lin, C.L., Sun, H.M., Steiner, M., Hwang, T.: Three‐party encrypted key exchange without server Public-keys. IEEE Communication Letters 5, 497–499 (2001)

    Article  MATH  Google Scholar 

  2. Chang, C.C., Chang, Y.F.: A novel three-party encrypted key exchange protocol. Computer Standards and Interfaces 26, 471–476 (2004)

    Article  Google Scholar 

  3. Lee, T.F., Hwang, T., Lin, C.L.: Enhanced three-party encrypted key exchange without server public keys. Computers & Security 23, 571–577 (2004)

    Article  Google Scholar 

  4. Lee, S.W., Kim, H.S., Yoo, K.Y.: Efficient verifier-based key agreement protocol for three parties without server’s public key. Applied Mathematics and Computation 167, 996–1003 (2005)

    Article  MathSciNet  Google Scholar 

  5. Guo, H., Li, Z., Mu, Y., Zhang, X.: Cryptanalysis of simple three-party key exchange protocol. Computers & Security 27(1-2), 16–21 (2008)

    Article  Google Scholar 

  6. Huang, H.: A simple three-party password-based key exchange protocol. International Journal of Communication Systems 22(7), 857–862 (2009)

    Article  Google Scholar 

  7. Chen, T.H., Lee, W.B., Chen, H.B.: A round- and computation-efficient three-party authenticated key exchange protocol. The Journal of Systems and Software 81, 1581–1590 (2008)

    Article  Google Scholar 

  8. Zhao, J., Gu, D., Zhang, L.: Security analysis and enhancement for three-party password-based authenticated key exchange protocol. Security & Communication Networks 5(3), 273–278 (2012)

    Article  Google Scholar 

  9. Hsiang, H., Shiha, W.: Improvement of the secure dynamic ID based remote user authentication next term scheme for multi-server environment. Computer Standards & Interfaces 31(6), 1118–1123 (2009)

    Article  MATH  Google Scholar 

  10. Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  11. Messerges, T., Dabbish, E., Sloan, R.: Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 51(5), 541–552 (2002)

    Article  MathSciNet  Google Scholar 

  12. Zhian, Z.: An Efficient Authentication Scheme for Telecare Medicine Information Systems. Journal of Medical Systems, Springer (2012), doi: 10.1007/s10916-012-9856-9

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Khan, M.K., He, D. (2012). Weaknesses of “Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol”. In: Xiang, Y., Pathan, M., Tao, X., Wang, H. (eds) Data and Knowledge Engineering. ICDKE 2012. Lecture Notes in Computer Science, vol 7696. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34679-8_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34679-8_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34678-1

  • Online ISBN: 978-3-642-34679-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics