Javascript must be enabled to continue!
Security Analysis of Password-based Authenticated Key Exchange Protocols
View through CrossRef
Abstract
Password-based cryptosystems commonly suffer from dictionary attacks because their security depends on low entropy passwords. It is ever challenging to design a password-based cryptosystem secure against this attack. Password-based authenticated key exchange (PAKE) protocols allow two or more interacting parties to establish cryptographic keys based on their knowledge of some password. The PAKE protocols commonly use password-based encryption and are therefore susceptible to dictionary attacks. Many existing PAKE protocols are claimed to be secure against these dictionary attacks but there is no easy method to verify their claim. In this work we focus on evaluating the security of two-party PAKE protocols under possible attack scenarios. We first consider all possible combination of participants of an attack scenario, which turn out to be 5 in number. This gives rise to 25 possible attack scenarios among the participants. We find that 11 out of these 25 scenarios are valid. We then analyze the security of 5 PAKE protocols under the attack scenarios developed by us. Namely, we analyze EKE, SPEKE, SRP, KOY and IdBP protocols. We also provide some suggestions on improving existing PAKE designs.
Title: Security Analysis of Password-based Authenticated Key Exchange Protocols
Description:
Abstract
Password-based cryptosystems commonly suffer from dictionary attacks because their security depends on low entropy passwords.
It is ever challenging to design a password-based cryptosystem secure against this attack.
Password-based authenticated key exchange (PAKE) protocols allow two or more interacting parties to establish cryptographic keys based on their knowledge of some password.
The PAKE protocols commonly use password-based encryption and are therefore susceptible to dictionary attacks.
Many existing PAKE protocols are claimed to be secure against these dictionary attacks but there is no easy method to verify their claim.
In this work we focus on evaluating the security of two-party PAKE protocols under possible attack scenarios.
We first consider all possible combination of participants of an attack scenario, which turn out to be 5 in number.
This gives rise to 25 possible attack scenarios among the participants.
We find that 11 out of these 25 scenarios are valid.
We then analyze the security of 5 PAKE protocols under the attack scenarios developed by us.
Namely, we analyze EKE, SPEKE, SRP, KOY and IdBP protocols.
We also provide some suggestions on improving existing PAKE designs.
Related Results
Efficient Plain Password Cryptanalysis Techniques
Efficient Plain Password Cryptanalysis Techniques
In this research work, some low complexity and efficient cryptanalysis approaches are proposed to decrypt password (encryption keys). Passwords are still one of the most common mea...
Aplikasi Pengukuran Kekuatan dan Rekomendasi Password Berdasarkan Input Pengguna dengan Metode Entropi
Aplikasi Pengukuran Kekuatan dan Rekomendasi Password Berdasarkan Input Pengguna dengan Metode Entropi
Penelitian ini mengembangkan aplikasi berbasis Python untuk mengevaluasi kekuatan password serta memberikan rekomendasi password yang lebih aman menggunakan alfabet fonetik NATO, T...
Organizational Password Policy
Organizational Password Policy
The purpose of this chapter is to provide an overview of password policy. It specifically identifies some basic elements of password policy, password and password policy life cycle...
Organizational Password Policy
Organizational Password Policy
The purpose of this chapter is to provide an overview of password policy. It specifically identifies some basic elements of password policy, password and password policy life cycle...
User password repetitive patterns analysis and visualization
User password repetitive patterns analysis and visualization
Purpose– Passwords have been designed to protect individual privacy and security and widely used in almost every area of our life. The strength of passwords is therefore critical t...
Password Based Distribution Panel and Circuit Breaker Operation for the Safety of Lineman during Maintenance Work
Password Based Distribution Panel and Circuit Breaker Operation for the Safety of Lineman during Maintenance Work
Security is the prime concern in our day to day life while performing any activity. In the current scenario, accidental death of lineman is often read and evidenced. In this direct...
Optimizing IETF multimedia signaling protocols and architectures in 3GPP networks : an evolutionary approach
Optimizing IETF multimedia signaling protocols and architectures in 3GPP networks : an evolutionary approach
Signaling in Next Generation IP-based networks heavily relies in the family of multimedia signaling protocols defined by IETF. Two of these signaling protocols are RTSP and SIP, wh...
An Enhanced Graphical Password Technique Using Fake Pointers
An Enhanced Graphical Password Technique Using Fake Pointers
Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset, such as person, community, nation, or organization. Thus, the det...

