• DocumentCode
    258193
  • Title

    Security analysis of J-PAKE

  • Author

    Toorani, Mohsen

  • Author_Institution
    Dept. of Inf., Univ. of Bergen, Bergen, Norway
  • fYear
    2014
  • fDate
    23-26 June 2014
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    J-PAKE is a Password-Authenticated Key Exchange protocol, proposed in 2008 and presented again in 2010 and 2011. It does not require any public key infrastructure but uses zero-knowledge proofs. J-PAKE has been submitted as a candidate for the IEEE P1363.2 standard for password-based public key cryptography, and included in OpenSSL and OpenSSH. Since December 2010, J-PAKE has been used in Mozilla Firefox web browser. In this paper, we show that J-PAKE is vulnerable to password compromise impersonation attack, replay attack, and unknown key-share attack. We also propose some improvements for thwarting replay and unknown key-share attacks.
  • Keywords
    authorisation; cryptographic protocols; public key cryptography; IEEE P1363.2 standard; J-PAKE; Mozilla Firefox Web browser; OpenSSH; OpenSSL; password compromise impersonation attack; password-authenticated key exchange protocol; password-based public key cryptography; replay attack; security analysis; unknown key-share attack; zero-knowledge proofs; Authentication; Browsers; Dictionaries; Protocols; Resilience; Servers;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computers and Communication (ISCC), 2014 IEEE Symposium on
  • Conference_Location
    Funchal
  • Type

    conf

  • DOI
    10.1109/ISCC.2014.6912576
  • Filename
    6912576