메뉴 건너뛰기




Volumn 3089, Issue , 2004, Pages 414-425

Weaknesses of a password-authenticated key exchange protocol between clients with different passwords

Author keywords

Cross realm setting; Dictionary attacks; Password authenticated key exchange; Security

Indexed keywords

CRYPTOGRAPHY; NETWORK SECURITY;

EID: 35048872322     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24852-1_30     Document Type: Article
Times cited : (41)

References (31)
  • 1
    • 0344205205 scopus 로고
    • Minding Your p's and q's
    • Advaces in Cryptology ASIACRYPT'96, Springer-Verlag
    • R. Anderson and S. Vaudenay, Minding Your p's and q's, in Advaces in Cryptology ASIACRYPT'96, LNCS 963, pages 236-247, Springer-Verlag, 1995.
    • (1995) LNCS , vol.963 , pp. 236-247
    • Anderson, R.1    Vaudenay, S.2
  • 2
    • 35248889041 scopus 로고    scopus 로고
    • Security Analysis of a Password Authenticated Key Exchange Protocol
    • Proceedings of ISC'03, Springer-Verlag
    • F. Bao, Security Analysis of a Password Authenticated Key Exchange Protocol, in Proceedings of ISC'03, LNCS 2851, pages 208-217, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2851 , pp. 208-217
    • Bao, F.1
  • 3
    • 84945119254 scopus 로고
    • Entity Authentication and Key Distribution
    • Springer-Verlag
    • M. Bellare and P. Rogaway, Entity Authentication and Key Distribution, in Advances in cryptology - Crypto'93, pages 232-249, Springer-Verlag, 1993.
    • (1993) Advances in Cryptology - Crypto'93 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 0026850091 scopus 로고
    • Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks
    • S. Bellovin and M. Merritt, Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks, in Proceedings of IEEE Security and Privacy, pages 72-84, 1992.
    • (1992) Proceedings of IEEE Security and Privacy , pp. 72-84
    • Bellovin, S.1    Merritt, M.2
  • 5
    • 0027741529 scopus 로고    scopus 로고
    • Augumented Encrypted Key Exchange: A Password-based Protocol Secure Against Dictionary Attacks and Password File Compromise
    • S. Bellovin and M. Merritt, Augumented Encrypted Key Exchange: A Password-based Protocol Secure Against Dictionary Attacks and Password File Compromise. ACM Secrity '93, pages 244-250.
    • ACM Secrity '93 , pp. 244-250
    • Bellovin, S.1    Merritt, M.2
  • 6
    • 84937550984 scopus 로고    scopus 로고
    • Provably-secure Password Anthentiation and Key Exchange Using Diffie-Hellman
    • Advances in cryptology - EUROCRYPT 2000, Springer-Verlag
    • V. Boyko, P. MacKenzie, and S. Patel, Provably-secure Password Anthentiation and Key Exchange Using Diffie-Hellman. in Advances in cryptology - EUROCRYPT 2000, LNCS 1807, pages 156-171, Springer-Verlag, 2000.
    • (2000) LNCS , vol.1807 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 7
    • 84944063128 scopus 로고    scopus 로고
    • Password-Authenticated Key Exchange between Clients with Different Passwords
    • Proceedings of Information and Communications Security - ICICS 2002, Springer-Verlag
    • J. W. Byun, I. R. Jeong, D. H. Lee, and C-S. Park, Password-Authenticated Key Exchange Between Clients with Different Passwords, in Proceedings of Information and Communications Security - ICICS 2002, LNCS 2513, pages 134-146, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2513 , pp. 134-146
    • Byun, J.W.1    Jeong, I.R.2    Lee, D.H.3    Park, C.-S.4
  • 8
    • 84947224925 scopus 로고    scopus 로고
    • Efficient Kerberized multicast in Practical distributed setting
    • Proceedings of ISCOl, Springer-Verlag
    • G. D. Crescenzo, and O. Kornievskaia, Efficient Kerberized multicast in Practical distributed setting, in Proceedings of ISCOl, LNCS 2000, pages 27-45, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2000 , pp. 27-45
    • Crescenzo, G.D.1    Kornievskaia, O.2
  • 10
    • 0029531472 scopus 로고
    • Optimal Authentication Protocols Resistant to Password Guessing Attacks
    • L. Gong, Optimal Authentication Protocols Resistant to Password Guessing Attacks, in 8th IEEE Computer Security Foundations Workshop, pages 24-29, 1995.
    • (1995) 8th IEEE Computer Security Foundations Workshop , pp. 24-29
    • Gong, L.1
  • 12
    • 26844522740 scopus 로고    scopus 로고
    • EPA: An Efficient Password-Based Protocol for Authenticated Key Exchange
    • Proceedings of ACISP SOUS, Springer-Verlag Berlin Heidelberg 2003
    • Y. H. Hwang, D. H. Yum, and P. J. Lee, EPA: An Efficient Password-Based Protocol for Authenticated Key Exchange, in Proceedings of ACISP SOUS, LNCS 2727, Springer-Verlag Berlin Heidelberg 2003, pages 452-463, 2003
    • (2003) LNCS , vol.2727 , pp. 452-463
    • Hwang, Y.H.1    Yum, D.H.2    Lee, P.J.3
  • 13
    • 0030261758 scopus 로고    scopus 로고
    • Strong Password-Only Authenticated Key Exchange
    • October
    • D. Jablon, Strong Password-Only Authenticated Key Exchange, ACM Computer Communications Review, vol.26, no.5, pp. 5-20, October 1996.
    • (1996) ACM Computer Communications Review , vol.26 , Issue.5 , pp. 5-20
    • Jablon, D.1
  • 14
    • 85084161708 scopus 로고    scopus 로고
    • Dual-workfactor Encrypted Key Exchange: Efficiently Preventing Password Chaining and Dictionary Attacks
    • July
    • B. Jaspan, Dual-workfactor Encrypted Key Exchange: Efficiently Preventing Password Chaining and Dictionary Attacks, in Proceedings of the 6th Annual USENIX Security Conference, pages 43-50, July, 1996.
    • (1996) Proceedings of the 6th Annual USENIX Security Conference , pp. 43-50
    • Jaspan, B.1
  • 16
    • 0033157651 scopus 로고    scopus 로고
    • An Improvment of the Password-Based Authentication Protocol (KlP) on Security against Replay Attacks
    • T. Kwon, M. Kang, S. Jung, and J. Song, An Improvment of the Password-Based Authentication Protocol (KlP) on Security against Replay Attacks, IEICE Irans. Commun., E82-B(7), pages 991-997, 1999.
    • (1999) IEICE Irans. Commun. , vol.E82-B , Issue.7 , pp. 991-997
    • Kwon, T.1    Kang, M.2    Jung, S.3    Song, J.4
  • 17
    • 0031381717 scopus 로고    scopus 로고
    • An Adaptable and Reliable Authentication Protocol for Communication Networks
    • T. Kwon, M. Kang, and J. Song, An Adaptable and Reliable Authentication Protocol for Communication Networks, in Proceedings of IEEE INFOCOM'97, pages 737-744, 1997.
    • (1997) Proceedings of IEEE INFOCOM'97 , pp. 737-744
    • Kwon, T.1    Kang, M.2    Song, J.3
  • 18
    • 0029208641 scopus 로고
    • Several Practical Protocols for Authentication to Thresh-old Cryptosystems
    • C. H. Lim and P. J. Lee, Several Practical Protocols for Authentication to Thresh-old Cryptosystems, Information Processing Letters, 53, 1995, pages 91-96.
    • (1995) Information Processing Letters , vol.53 , pp. 91-96
    • Lim, C.H.1    Lee, P.J.2
  • 19
    • 0008145442 scopus 로고    scopus 로고
    • Three-party Encrypted Key Exchange: Attacks and a Solution
    • C.-L. Lin, Hung-Min Sun and T. Hwang. Three-party Encrypted Key Exchange: Attacks and A Solution. ACM Operating Systems Review, 34(4):12-20, 2000.
    • (2000) ACM Operating Systems Review , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.-L.1    Sun, H.-M.2    Hwang, T.3
  • 20
    • 0035701459 scopus 로고    scopus 로고
    • Three-party Encrypted Key Exchange Without Server Public-Keys
    • December
    • C.-L. Lin, H.-M. Sun and T. Hwang. Three-party Encrypted Key Exchange Without Server Public-Keys. IEEE Communications Letters, 5(12):497-499, December 2001.
    • (2001) IEEE Communications Letters , vol.5 , Issue.12 , pp. 497-499
    • Lin, C.-L.1    Sun, H.-M.2    Hwang, T.3
  • 21
    • 84957025686 scopus 로고    scopus 로고
    • Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys
    • Proceedings of Security Protocols Workshop, Springer-Verlag
    • S. Lucks, Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys, in Proceedings of Security Protocols Workshop, LNCS 1361, pages 79-90, Springer-Verlag, 1997.
    • (1997) LNCS , vol.1361 , pp. 79-90
    • Lucks, S.1
  • 22
    • 84937402236 scopus 로고    scopus 로고
    • Password-Authenticated Key Exchange Based on RSA
    • Proceedings of AsiaCrypt 2000, Springer-Verlag
    • P. MacKenzie, S. Patel, and R. Swaminathan, Password-Authenticated Key Exchange Based on RSA, in Proceedings of AsiaCrypt 2000, LNCS 1976, pages 599-613, Springer-Verlag, 2000.
    • (2000) LNCS , vol.1976 , pp. 599-613
    • MacKenzie, P.1    Patel, S.2    Swaminathan, R.3
  • 23
    • 33846461562 scopus 로고    scopus 로고
    • The PAK suite: Protocols for Password-Authenticated Key Exchange
    • April
    • P. MacKenzie, The PAK suite: Protocols for Password-Authenticated Key Exchange, Submission to IEEE P1363.2, April 2002.
    • (2002) Submission to IEEE P1363.2
    • MacKenzie, P.1
  • 24
    • 84937579448 scopus 로고    scopus 로고
    • More Efficient Password-Authenticated Key Exchange
    • P. MacKenzie, More Efficient Password-Authenticated Key Exchange, Progress in Cryptology - CT-RSA 2001, pages 361-377, 2001.
    • (2001) Progress in Cryptology - CT-RSA 2001 , pp. 361-377
    • MacKenzie, P.1
  • 25
    • 84947723778 scopus 로고    scopus 로고
    • n
    • Advances in cryptology-ASIACRYPT'98, Spinger-Verlag
    • n in Advances in cryptology-ASIACRYPT'98, LNCS 1514, Spinger-Verlag, 1998, pp.214-226.
    • (1998) LNCS , vol.1514 , pp. 214-226
    • Mao, W.1    Lim, C.H.2
  • 27
    • 0001636850 scopus 로고
    • Kerberos: An Authentication Service for Open Network Systems
    • February
    • J. G. Steiner, B. C. Newman, and J. I. Schiller, Kerberos: An Authentication Service for Open Network Systems, in USENIX Conference Proceedings, pages 191-202, February, 1988.
    • (1988) USENIX Conference Proceedings , pp. 191-202
    • Steiner, J.G.1    Newman, B.C.2    Schiller, J.I.3
  • 29
    • 35048901616 scopus 로고    scopus 로고
    • Cryptanalysis of Two Password-Authenticated Key Exchange Protocols
    • Proceedings of ACISP 2004, Springer-Verlage (to appear)
    • Z. Wan, and S. Wang, Cryptanalysis of Two Password-Authenticated Key Exchange Protocols, in Proceedings of ACISP 2004, LNCS, Springer-Verlage (to appear), 2004.
    • (2004) LNCS
    • Wan, Z.1    Wang, S.2
  • 31
    • 84945247158 scopus 로고    scopus 로고
    • Password authenticated key exchange based on RSA for imbalanced wireless networks
    • Proceedings of ISC 2002, Springer-Verlag
    • F. Zhu, D. S. Wong, A. H. Chan, and R. Ye, Password authenticated key exchange based on RSA for imbalanced wireless networks, in Proceedings of ISC 2002, LNCS 2433, pp. 150-161, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2433 , pp. 150-161
    • Zhu, F.1    Wong, D.S.2    Chan, A.H.3    Ye, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.