DocumentCode :
866918
Title :
Analysis of the SPEKE password-authenticated key exchange protocol
Author :
Zhang, Muxiang
Author_Institution :
Verizon Commun. Inc., Waltham, MA, USA
Volume :
8
Issue :
1
fYear :
2004
Firstpage :
63
Lastpage :
65
Abstract :
In this letter, we show that for the SPEKE password-authenticated key exchange protocol, an adversary is able to test multiple possible passwords using a single impersonation attempt. In particular, when passwords are short Personal Identification Numbers (PINs), we show that a fully-constrained SPEKE is susceptible to password guessing attack. Our analysis contradicts the claim that the SPEKE protocol appears to be at least as strong as the Bellovin-Merritt EKE protocol. For EKE, an adversary can gain information about at most one possible password in each impersonation attempt.
Keywords :
cryptography; message authentication; protocols; telecommunication security; SPEKE protocol; key exchange; multiple possible password; network security; password guessing attack; password-authentication; personal identification number; single impersonation; Access protocols; Authentication; Cryptography; Data security; Dictionaries; Helium; Information security; Pins; Standards development; Testing;
fLanguage :
English
Journal_Title :
Communications Letters, IEEE
Publisher :
ieee
ISSN :
1089-7798
Type :
jour
DOI :
10.1109/LCOMM.2003.822506
Filename :
1261928
Link To Document :
بازگشت