Cargando…
Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks
While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE p...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2014
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4189515/ https://www.ncbi.nlm.nih.gov/pubmed/25309956 http://dx.doi.org/10.1155/2014/802359 |
_version_ | 1782338376782839808 |
---|---|
author | Nam, Junghyun Choo, Kim-Kwang Raymond Paik, Juryon Won, Dongho |
author_facet | Nam, Junghyun Choo, Kim-Kwang Raymond Paik, Juryon Won, Dongho |
author_sort | Nam, Junghyun |
collection | PubMed |
description | While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol. |
format | Online Article Text |
id | pubmed-4189515 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2014 |
publisher | Hindawi Publishing Corporation |
record_format | MEDLINE/PubMed |
spelling | pubmed-41895152014-10-12 Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks Nam, Junghyun Choo, Kim-Kwang Raymond Paik, Juryon Won, Dongho ScientificWorldJournal Research Article While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol. Hindawi Publishing Corporation 2014 2014-09-18 /pmc/articles/PMC4189515/ /pubmed/25309956 http://dx.doi.org/10.1155/2014/802359 Text en Copyright © 2014 Junghyun Nam et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Nam, Junghyun Choo, Kim-Kwang Raymond Paik, Juryon Won, Dongho Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks |
title | Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks |
title_full | Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks |
title_fullStr | Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks |
title_full_unstemmed | Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks |
title_short | Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks |
title_sort | password-only authenticated three-party key exchange proven secure against insider dictionary attacks |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4189515/ https://www.ncbi.nlm.nih.gov/pubmed/25309956 http://dx.doi.org/10.1155/2014/802359 |
work_keys_str_mv | AT namjunghyun passwordonlyauthenticatedthreepartykeyexchangeprovensecureagainstinsiderdictionaryattacks AT chookimkwangraymond passwordonlyauthenticatedthreepartykeyexchangeprovensecureagainstinsiderdictionaryattacks AT paikjuryon passwordonlyauthenticatedthreepartykeyexchangeprovensecureagainstinsiderdictionaryattacks AT wondongho passwordonlyauthenticatedthreepartykeyexchangeprovensecureagainstinsiderdictionaryattacks |