4.4 Article

Cryptanalysis of an efficient three-party password-based key exchange scheme

Journal

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
Volume 25, Issue 11, Pages 1443-1449

Publisher

WILEY
DOI: 10.1002/dac.1373

Keywords

cryptanalysis; password-authenticated key exchange; three-party; offline password guessing; key-compromise impersonation

Ask authors/readers for more resources

Three-party password-authenticated key exchange (3PAKE) protocols allow entities to negotiate a secret session key with the aid of a trusted server with whom they share a human-memorable password. Recently, Lou and Huang proposed a simple 3PAKE protocol based on elliptic curve cryptography, which is claimed to be secure and to provide superior efficiency when compared with similar-purpose solutions. In this paper, however, we show that the solution is vulnerable to key-compromise impersonation and offline password guessing attacks from system insiders or outsiders, which indicates that the empirical approach used to evaluate the scheme's security is flawed. These results highlight the need of employing provable security approaches when designing and analyzing PAKE schemes. Copyright (c) 2011 John Wiley & Sons, Ltd.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available