Weaknesses of a password-authenticated key exchange protocol between clients with different passwords

41Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

A password-authenticated key exchange scheme allows two entities, who only share a memorable password, to authenticate each other and to agree on a cryptographic session key. Instead of considering it in the classic client and server scenarios, Byun et al. recently proposed a password-authenticated key exchange protocol in a cross-realm setting where two clients in different realms obtain a secret session key as well as mutual authentication, with the help of respective servers. In this paper, we first point out that the proposed protocol is not secure, due to the choice of invalid parameters (say, subgroup generator). Furthermore, we show in detail that, even with properly chosen parameters, the protocol has still some secure flaws. We provide three attacks to illustrate the insecurity of the protocol. Finally, countermeasures are also given, which are believed able to withstand our attacks. © Springer-Verlag Berlin Heidelberg 2004.

Cite

CITATION STYLE

APA

Wang, S., Wang, J., & Xu, M. (2004). Weaknesses of a password-authenticated key exchange protocol between clients with different passwords. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3089, 414–425. https://doi.org/10.1007/978-3-540-24852-1_30

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free