×

Weaknesses of a password-authenticated key exchange protocol between clients with different passwords. (English) Zbl 1103.68542

Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 414-425 (2004).
Summary: A password-authenticated key exchange scheme allows two entities, who only share a memorable password, to authenticate each other and to agree on a cryptographic session key. Instead of considering it in the classic client and server scenarios, Byun et al. recently proposed a password-authenticated key exchange protocol in a cross-realm setting where two clients in different realms obtain a secret session key as well as mutual authentication, with the help of respective servers. In this paper, we first point out that the proposed protocol is not secure, due to the choice of invalid parameters (say, subgroup generator). Furthermore, we show in detail that, even with properly chosen parameters, the protocol has still some secure flaws. We provide three attacks to illustrate the insecurity of the protocol. Finally, countermeasures are also given, which are believed able to withstand our attacks.
For the entire collection see [Zbl 1052.68004].

MSC:

68P25 Data encryption (aspects in computer science)
94A60 Cryptography
94A62 Authentication, digital signatures and secret sharing
Full Text: DOI