• DocumentCode
    3570909
  • Title

    A secure two-party password-authenticated key exchange protocol

  • Author

    Saeed, Maryam ; Shahhoseini, Hadi Shahriar ; Mackvandi, Ali ; Rezaeinezhad, Mohammad Reza ; Naddafiun, Mansour ; Bidoki, Mohammad Zare

  • Author_Institution
    Iran Univ. of Sci. & Technol., Tehran, Iran
  • fYear
    2014
  • Firstpage
    466
  • Lastpage
    474
  • Abstract
    PAKE protocols which stands for Password Authenticated Key Exchange are of great importance for providing secure communications over the Internet. They permit two entities to share a session key in an authentic manner based on a human-memorable password. In 2006, Kolesnikov and Rackoff proposed an improvement to the Halevi and Krawczyk´s PAKE protocols. In 2010, they revised their preceding protocol and introduced an improvement to it. In this paper, it is shown that not only are Halevi and Krawczyk´s PAKE protocols vulnerable to ephemeral key compromise impersonation and malicious server attacks, but they also fail to provide key confirmation property simultaneously, one of which does not even satisfy Forward Secrecy attribute. It is also shown that Kolesnikov and Rackoffs protocols are susceptible to ephemeral key compromise impersonation and to Denial-of-Service (DoS) attacks, nor do they satisfy Forward Secrecy, mutual authentication, and key confirmation attributes. Additionally, they are prone to the disclosure of pre-shared secret key. Two improved protocols, called S2PAKEvl and S2PAKEv2, are also proposed providing several security attributes, both of which are still efficient. S2PAKEvl has two rounds with mutual authentication and not providing key confirmation, while S2PAKEv2 is of three rounds holding mutual authentication and key confirmation.
  • Keywords
    authorisation; computer crime; computer network security; cryptographic protocols; message authentication; DoS attacks; Internet; Kolesnikov and Rackoffs protocols; PAKE protocols; S2PAKEv2 protocols; S2PAKEvl protocols; denial-of-service attacks; ephemeral key compromise impersonation; forward secrecy attribute; human-memorable password; key confirmation attributes; key confirmation property; malicious server attacks; mutual authentication; secure communications; secure two-party password-authenticated key exchange protocol; security attributes; session key; Authentication; Computer crime; Databases; Protocols; Resilience; Servers; Cryptographic protocols; Denial-of-Service (DoS); Ephemeral Key Compromise Impersonation; Forward Secrecy; Password-authenticated key exchange; attacks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference on
  • Type

    conf

  • DOI
    10.1109/IRI.2014.7051926
  • Filename
    7051926