Security analysis of a password authenticated key exchange protocol

24Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A password authenticated key exchange (PAKE) protocol allows two parties who share a memorable password to obtain a common shared cryptographic key. The central security requirement to such a protocol is that the password should not be subject to (offline) dictionary attack. Following the EKE proposed by Bellovin and Merritt in 1992 [1], many PAKE protocols have been proposed. In this paper we give a security analysis to an RSA-based PAKE protocol proposed in ISC'02 [12]. Our analysis shows that the protocol is subject to dictionary attack when the length of the ID of the second party is small; and therefore the security of the protocol is not related to the security parameters such as the size of the RSA modulo n or the length of the hash function. This violates the security definition of PAKE protocols. Previously well-designed PAKE protocols do not have this security flaw. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Bao, F. (2003). Security analysis of a password authenticated key exchange protocol. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2851, 208–217. https://doi.org/10.1007/10958513_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free