Title of article :
Three weaknesses in a simple three-party key exchange protocol
Author/Authors :
Hao-Rung Chung، نويسنده , , Wei-Chi Ku، نويسنده ,
Issue Information :
روزنامه با شماره پیاپی سال 2008
Pages :
10
From page :
220
To page :
229
Abstract :
In 2005, Wen et al. proposed a three-party password-based authenticated key exchange protocol using Weil pairing and showed that their protocol is provably secure. Unfortunately, Nam et al. demonstrated that Wen et al.’s protocol cannot resist a man-in-the-middle attack, and then interpreted their attack in the context of the formal proof model. Recently, Lu and Cao proposed a simple three-party password-based authenticated key exchange (S-3PAKE) protocol based on the CCDH assumption. They claimed that their protocol is superior to similar protocols with respect to security and efficiency. However, we find that the S-3PAKE protocol is still vulnerable to an impersonation-of-initiator attack, an impersonation-of-responder attack, and a man-in-the-middle attack. In this paper, we first briefly review the S-3PAKE protocol, and then demonstrate its weaknesses by using traditional informal description and formal description, respectively. To enhance the security of the S-3PAKE protocol, we suggest a countermeasure against our impersonation-of-initiator attack, impersonation-of-responder attack, and man-in-the-middle attack.
Keywords :
Authenticated key exchange , Impersonation attack , Man-in-the-Middle Attack , PASSWORD , provable security
Journal title :
Information Sciences
Serial Year :
2008
Journal title :
Information Sciences
Record number :
1213171
Link To Document :
بازگشت