• DocumentCode
    1464239
  • Title

    Authenticated key exchange protocols resistant to password guessing attacks

  • Author

    Kwon, T. ; Song, J.

  • Author_Institution
    Dept. of Comput. Sci., Yonsei Univ., Seoul, South Korea
  • Volume
    145
  • Issue
    5
  • fYear
    1998
  • fDate
    10/1/1998 12:00:00 AM
  • Firstpage
    304
  • Lastpage
    308
  • Abstract
    A user-chosen password is not appropriate for a shared secret by which an authenticated key exchange protocol is operated. This is because users choose their passwords so that they can be easily memorised and can be typed using an alphabetic keyboard or a numeric keypad. Therefore, the password becomes a weak secret which is vulnerable to guessing attacks. However, users prefer to utilise the short easily memorised passwords. Several protocols, which are resistant to guessing attacks, have been developed to overcome this problem. However, they are inefficient in terms of the computation and communication costs. As a more practical solution, the authors propose new authenticated key exchange protocols by reducing the number of random numbers, cipher operations, and protocol steps. To achieve this goal, they deliberately use a one-time pad and a strong one-way hash function in their protocols
  • Keywords
    cryptography; protocols; authenticated key exchange protocol; authenticated key exchange protocols; cipher operations; one-time pad; password guessing attacks; random numbers; shared secret; strong one-way hash function; user-chosen password; weak secret;
  • fLanguage
    English
  • Journal_Title
    Communications, IEE Proceedings-
  • Publisher
    iet
  • ISSN
    1350-2425
  • Type

    jour

  • DOI
    10.1049/ip-com:19982282
  • Filename
    739690