Abstract
Recently, Yeh and Sun proposed a simple authenticated key agreement protocol resistant to password guessing attacks called SAKA that is simple and cost-effective. And they provided a formal proof of security to show its strength against both passive and active adversaries. Compared with the previous well-known protocols, SAKA has less number of steps and less computation cost. However, considering the total execution time, SAKA is not the most efficient method, since it does not provide parties with parallel computation. In this paper, we present parallelizable simple authenticated key agreement protocol for improving the efficiency of the SAKA while maintaining provable security.
- W. Diffie and M. E. Hellman, "New directions in cryptography." IEEE Trans. Inform. Theory, IT-22:644--654, November 1976.Google ScholarDigital Library
- S. M. Bellovin and M. Merritt, "Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks," IEEE Symposium on Research in Security and Privacy, pp. 72--84, 1992. Google ScholarDigital Library
- D. H. Seo and P. Seweeney, "Simple authenticated key agreement algorithm," Electronic Lett., 1999, 35, (13), pp. 1073--1074.Google ScholarCross Ref
- V. Boyko, P. MacKenzie and S. Patel, "Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman," Advances in Cryptology-EUROCRYPT'2000, pp. 156--171, 2000. Google ScholarDigital Library
- M. Bellare, D. Pointcheval and P. Rogaway, "Authenticated Key Exchange Secure Against Dictionary Attacks," Advances in Cryptology-EUROCRYPT'2000, pp. 139--155, 2000. Google ScholarDigital Library
- T. Kwon and J. Song, "A Study on the Generalized Key Agreement and Password Authentication Protocol," IEICE TRANS. COMMUN., vol. E83-B, no. 9, pp. 2044--2050, SEP 2000.Google Scholar
- H. T. Yeh and H. M. Sun, "Simple Authenticated Key Agreement Protocol Resistant to Password Guessing Attacks," ACM Operating Systems Review, vol. 36, Issues 4, October 2002. Google ScholarDigital Library
Index Terms
- Parallizable simple authenticated key agreement protocol
Recommendations
Parallizable simple authenticated key agreement protocol
Recently, Yeh and Sun proposed a simple authenticated key agreement protocol resistant to password guessing attacks called SAKA that is simple and cost-effective. And they provided a formal proof of security to show its strength against both passive and ...
Simple authenticated key agreement protocol resistant to password guessing attacks
Password-based mechanism is the widely used method for user authentication. Many password-based authenticated key exchange protocols have been proposed to resist password guessing attacks. In this paper, we present a simple authenticated key agreement ...
Security weaknesses of authenticated key agreement protocols
In this paper, we analyze the protocols of Tan, Lim et al., Chen et al. and five protocols of Holbl et al. After the analysis, we found that Tan et al.@?s, Lim et al.@?s and two protocols of Holbl et al. are insecure against the impersonation attack and ...
Comments