• DocumentCode
    866918
  • Title

    Analysis of the SPEKE password-authenticated key exchange protocol

  • Author

    Zhang, Muxiang

  • Author_Institution
    Verizon Commun. Inc., Waltham, MA, USA
  • Volume
    8
  • Issue
    1
  • fYear
    2004
  • Firstpage
    63
  • Lastpage
    65
  • Abstract
    In this letter, we show that for the SPEKE password-authenticated key exchange protocol, an adversary is able to test multiple possible passwords using a single impersonation attempt. In particular, when passwords are short Personal Identification Numbers (PINs), we show that a fully-constrained SPEKE is susceptible to password guessing attack. Our analysis contradicts the claim that the SPEKE protocol appears to be at least as strong as the Bellovin-Merritt EKE protocol. For EKE, an adversary can gain information about at most one possible password in each impersonation attempt.
  • Keywords
    cryptography; message authentication; protocols; telecommunication security; SPEKE protocol; key exchange; multiple possible password; network security; password guessing attack; password-authentication; personal identification number; single impersonation; Access protocols; Authentication; Cryptography; Data security; Dictionaries; Helium; Information security; Pins; Standards development; Testing;
  • fLanguage
    English
  • Journal_Title
    Communications Letters, IEEE
  • Publisher
    ieee
  • ISSN
    1089-7798
  • Type

    jour

  • DOI
    10.1109/LCOMM.2003.822506
  • Filename
    1261928