메뉴 건너뛰기




Volumn 178, Issue 13, 2008, Pages 2849-2856

Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)

Author keywords

Attacks; Cryptanalysis; Password authenticated key exchange; Provable security; Three party; Undetectable online dictionary; Unknown key share

Indexed keywords

AUTHENTICATION; INFORMATION SCIENCE; INTRUSION DETECTION; ONLINE SYSTEMS;

EID: 42649086478     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2008.02.008     Document Type: Article
Times cited : (74)

References (37)
  • 1
    • 0003515822 scopus 로고    scopus 로고
    • Explicit communication revisited: two new attacks on authentication protocols
    • Abadi M. Explicit communication revisited: two new attacks on authentication protocols. IEEE Transactions on Software Engineering 23 3 (1997) 185-186
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.3 , pp. 185-186
    • Abadi, M.1
  • 2
    • 24144491593 scopus 로고    scopus 로고
    • M. Abdalla, P.-A. Fouque, D. Pointcheval, Password-based authenticated key exchange in the three-party setting, in: Proceedings of the PKC'05, LNCS, vol. 3386, 2005, pp. 65-84.
    • M. Abdalla, P.-A. Fouque, D. Pointcheval, Password-based authenticated key exchange in the three-party setting, in: Proceedings of the PKC'05, LNCS, vol. 3386, 2005, pp. 65-84.
  • 3
    • 33645734992 scopus 로고    scopus 로고
    • Password-based authenticated key exchange in the three-party setting
    • Abdalla M., Fouque P.-A., and Pointcheval D. Password-based authenticated key exchange in the three-party setting. IET Information Security 153 1 (2006) 27-39
    • (2006) IET Information Security , vol.153 , Issue.1 , pp. 27-39
    • Abdalla, M.1    Fouque, P.-A.2    Pointcheval, D.3
  • 4
    • 24144443144 scopus 로고    scopus 로고
    • M. Abdalla, D. Pointcheval, Simple password-based encrypted key exchange protocols, in: Proceedings of the CT-RSA'05, LNCS, vol. 3376, 2005, pp. 191-208.
    • M. Abdalla, D. Pointcheval, Simple password-based encrypted key exchange protocols, in: Proceedings of the CT-RSA'05, LNCS, vol. 3376, 2005, pp. 191-208.
  • 5
    • 26444476977 scopus 로고    scopus 로고
    • M. Abdalla, D. Pointcheval, Interactive Diffie-Hellman assumptions with applications to password-based authentication, in: Proceedings of the FC'05, LNCS, vol. 3570, 2005, pp. 341-356.
    • M. Abdalla, D. Pointcheval, Interactive Diffie-Hellman assumptions with applications to password-based authentication, in: Proceedings of the FC'05, LNCS, vol. 3570, 2005, pp. 341-356.
  • 6
    • 42649101355 scopus 로고    scopus 로고
    • M. Abdalla, D. Pointcheval, Interactive Diffie-Hellman assumptions with applications to password-based authentication. Full version of [5] .
    • M. Abdalla, D. Pointcheval, Interactive Diffie-Hellman assumptions with applications to password-based authentication. Full version of [5] .
  • 8
    • 84945119254 scopus 로고    scopus 로고
    • M. Bellare, P. Rogaway, Entity authentication and key distribution, in: Advances in Cryptology - Crypto'93, LNCS, vol. 773, 1993, pp. 232-249.
    • M. Bellare, P. Rogaway, Entity authentication and key distribution, in: Advances in Cryptology - Crypto'93, LNCS, vol. 773, 1993, pp. 232-249.
  • 9
    • 42649120131 scopus 로고    scopus 로고
    • M. Bellare, P. Rogaway, Provably secure session key distribution: the three party case, in: Proceedings of the ACM Symposium on the Theory of Computing (STOC'95), 1995, pp. 57-66.
    • M. Bellare, P. Rogaway, Provably secure session key distribution: the three party case, in: Proceedings of the ACM Symposium on the Theory of Computing (STOC'95), 1995, pp. 57-66.
  • 10
    • 84873466407 scopus 로고    scopus 로고
    • M. Bellare, D. Pointcheval, P. Rogaway, Authenticated key exchange secure against dictionary attacks, in: Advances in Cryptology - Eurocrypt'00, LNCS, vol. 1807, 2000, pp. 139-155.
    • M. Bellare, D. Pointcheval, P. Rogaway, Authenticated key exchange secure against dictionary attacks, in: Advances in Cryptology - Eurocrypt'00, LNCS, vol. 1807, 2000, pp. 139-155.
  • 11
    • 0026850091 scopus 로고    scopus 로고
    • S. Bellovin, M. Merritt, Encrypted key exchange: passwords based protocols secure against dictionary attacks, in: Proceedings of the IEEE Symposium on Security and Privacy'92, 1992, pp. 72-84.
    • S. Bellovin, M. Merritt, Encrypted key exchange: passwords based protocols secure against dictionary attacks, in: Proceedings of the IEEE Symposium on Security and Privacy'92, 1992, pp. 72-84.
  • 12
    • 84944063128 scopus 로고    scopus 로고
    • J.W. Byun, I.R. Jeong, D.H. Lee, C.S. Park, Password-authenticated key exchange between clients with different passwords, in: Proceedings of the ICICS'02, LNCS, vol. 2513, 2002, pp. 134-146.
    • J.W. Byun, I.R. Jeong, D.H. Lee, C.S. Park, Password-authenticated key exchange between clients with different passwords, in: Proceedings of the ICICS'02, LNCS, vol. 2513, 2002, pp. 134-146.
  • 13
    • 2342566530 scopus 로고    scopus 로고
    • A novel three-party encrypted key exchange protocol
    • Chang C.-C., and Chang Y.-F. A novel three-party encrypted key exchange protocol. Computer Standards and Interfaces 26 5 (2004) 471-476
    • (2004) Computer Standards and Interfaces , vol.26 , Issue.5 , pp. 471-476
    • Chang, C.-C.1    Chang, Y.-F.2
  • 14
    • 33646805409 scopus 로고    scopus 로고
    • K.-K.R. Choo, C. Boyd, Y. Hitchcock, Examining indistinguishability-based proof models for key establishment protocols, in: Advances in Cryptology - Asiacrypt'05, LNCS, vol. 3788, 2005, pp. 585-604.
    • K.-K.R. Choo, C. Boyd, Y. Hitchcock, Examining indistinguishability-based proof models for key establishment protocols, in: Advances in Cryptology - Asiacrypt'05, LNCS, vol. 3788, 2005, pp. 585-604.
  • 15
    • 33646779184 scopus 로고    scopus 로고
    • K.-K.R. Choo, C. Boyd, Y. Hitchcock, Errors in computational complexity proofs for protocols, in: Advances in Cryptology - Asiacrypt'05, LNCS, vol. 3788, 2005, pp. 624-643.
    • K.-K.R. Choo, C. Boyd, Y. Hitchcock, Errors in computational complexity proofs for protocols, in: Advances in Cryptology - Asiacrypt'05, LNCS, vol. 3788, 2005, pp. 624-643.
  • 16
    • 34948903343 scopus 로고    scopus 로고
    • Three weaknesses in a simple three-party key exchange protocol
    • Chung H.-R., and Ku W.-C. Three weaknesses in a simple three-party key exchange protocol. Information Sciences 178 1 (2008) 220-229
    • (2008) Information Sciences , vol.178 , Issue.1 , pp. 220-229
    • Chung, H.-R.1    Ku, W.-C.2
  • 18
    • 0002805220 scopus 로고
    • Undetectable On-line Password Guessing Attacks
    • Ding Y., and Horster P. Undetectable On-line Password Guessing Attacks. ACM Operating Systems Review 29 4 (1995) 77-86
    • (1995) ACM Operating Systems Review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 19
    • 35248830706 scopus 로고    scopus 로고
    • R. Gennaro, Y. Lindell, A framework for password-based authenticated key exchange, in: Advances in Cryptology - Eurocrypt'03, LNCS, vol. 2656, 2003, pp. 524-543.
    • R. Gennaro, Y. Lindell, A framework for password-based authenticated key exchange, in: Advances in Cryptology - Eurocrypt'03, LNCS, vol. 2656, 2003, pp. 524-543.
  • 22
    • 33745766832 scopus 로고    scopus 로고
    • J. Katz, J.S. Shin, Modeling insider attacks on group-key exchange protocols, in: Proceedings of the ACM-CCS'05, 2005, pp. 180-189.
    • J. Katz, J.S. Shin, Modeling insider attacks on group-key exchange protocols, in: Proceedings of the ACM-CCS'05, 2005, pp. 180-189.
  • 23
    • 35048820669 scopus 로고    scopus 로고
    • S. Katzenbeisser, On the Integration of watermarks and cryptography, in: Proceedings of the IWDW'03, LNCS, vol. 2939, 2003, pp. 50-60.
    • S. Katzenbeisser, On the Integration of watermarks and cryptography, in: Proceedings of the IWDW'03, LNCS, vol. 2939, 2003, pp. 50-60.
  • 24
    • 35048854202 scopus 로고    scopus 로고
    • J. Kim, S. Kim, J. Kwak, D. Won, Cryptanalysis and improvement of password-authenticated key exchange scheme between clients with different passwords, in: Proceedings of the ICCSA'04, LNCS, vol. 3043, 2004, pp. 895-902.
    • J. Kim, S. Kim, J. Kwak, D. Won, Cryptanalysis and improvement of password-authenticated key exchange scheme between clients with different passwords, in: Proceedings of the ICCSA'04, LNCS, vol. 3043, 2004, pp. 895-902.
  • 25
    • 33646720921 scopus 로고    scopus 로고
    • S. Kim, H. Lee H. Oh, Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment, in: Proceedings of the ICICS'05, LNCS, vol. 3783, 2005, pp. 323-336.
    • S. Kim, H. Lee H. Oh, Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment, in: Proceedings of the ICICS'05, LNCS, vol. 3783, 2005, pp. 323-336.
  • 26
    • 8344221264 scopus 로고    scopus 로고
    • Enhanced three-party encrypted key exchange without server public keys
    • Lee T.-F., Hwang T., and Lin C.-L. Enhanced three-party encrypted key exchange without server public keys. Computers and Security 23 7 (2004) 571-577
    • (2004) Computers and Security , vol.23 , Issue.7 , pp. 571-577
    • Lee, T.-F.1    Hwang, T.2    Lin, C.-L.3
  • 27
    • 0008145442 scopus 로고    scopus 로고
    • Three party-encrypted key exchange: attacks and a solution
    • Lin C.-L., Sun H.-M., and Hwang T. Three party-encrypted key exchange: attacks and a solution. ACM Operating Systems Review 34 4 (2000) 12-20
    • (2000) ACM Operating Systems Review , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.-L.1    Sun, H.-M.2    Hwang, T.3
  • 28
    • 0035701459 scopus 로고    scopus 로고
    • Three-party encrypted key exchange without server public-keys
    • Lin C.-L., Sun H.-M., Steiner M., and Hwang T. Three-party encrypted key exchange without server public-keys. IEEE Communication Letters 5 12 (2001) 497-499
    • (2001) IEEE Communication Letters , vol.5 , Issue.12 , pp. 497-499
    • Lin, C.-L.1    Sun, H.-M.2    Steiner, M.3    Hwang, T.4
  • 29
    • 25144525619 scopus 로고    scopus 로고
    • Efficient verifier-based key agreement protocol for three parties without servers public key
    • Lee S.W., Kim H.S., and Yoo K.Y. Efficient verifier-based key agreement protocol for three parties without servers public key. Applied Mathematics and Computation 167 2 (2005) 996-1003
    • (2005) Applied Mathematics and Computation , vol.167 , Issue.2 , pp. 996-1003
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 30
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • Lu R., and Cao Z. Simple three-party key exchange protocol. Computers and Security 26 (2007) 94-97
    • (2007) Computers and Security , vol.26 , pp. 94-97
    • Lu, R.1    Cao, Z.2
  • 31
    • 33845941453 scopus 로고    scopus 로고
    • Security weakness in a three-party pairing-based protocol for password authenticated key exchange
    • Nam J., Lee Y., Kim S., and Won D. Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Information Sciences 177 6 (2007) 1364-1375
    • (2007) Information Sciences , vol.177 , Issue.6 , pp. 1364-1375
    • Nam, J.1    Lee, Y.2    Kim, S.3    Won, D.4
  • 32
    • 33746600612 scopus 로고    scopus 로고
    • R.C.-W. Phan, B.-M. Goi, Cryptanalysis of the N-party encrypted Diffie-Hellman key exchange using different passwords, in: Proceedings of the ACNS'06, LNCS, vol. 3989, 2006, pp. 226-238.
    • R.C.-W. Phan, B.-M. Goi, Cryptanalysis of the N-party encrypted Diffie-Hellman key exchange using different passwords, in: Proceedings of the ACNS'06, LNCS, vol. 3989, 2006, pp. 226-238.
  • 33
    • 37549042706 scopus 로고    scopus 로고
    • R.C.-W. Phan, B.-M. Goi. Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols, in: Proceedings of the Indocrypt'06, LNCS, vol. 4329, 2006, pp. 104-117.
    • R.C.-W. Phan, B.-M. Goi. Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols, in: Proceedings of the Indocrypt'06, LNCS, vol. 4329, 2006, pp. 104-117.
  • 34
    • 9544230689 scopus 로고    scopus 로고
    • Secure key agreement protocols for three-party against guessing attacks
    • Sun H.-M., Chen B.-C., and Hwang T. Secure key agreement protocols for three-party against guessing attacks. The Journal of Systems and Software 75 (2005) 63-68
    • (2005) The Journal of Systems and Software , vol.75 , pp. 63-68
    • Sun, H.-M.1    Chen, B.-C.2    Hwang, T.3
  • 36
    • 35248867842 scopus 로고    scopus 로고
    • J. Stern, Why provable security matters? in: Advances in Cryptology - Eurocrypt'03, LNCS, vol. 2656, 2003, pp. 449-461.
    • J. Stern, Why provable security matters? in: Advances in Cryptology - Eurocrypt'03, LNCS, vol. 2656, 2003, pp. 449-461.
  • 37
    • 33646746196 scopus 로고    scopus 로고
    • E.-J. Yoon, K.-Y. Yoo, Cryptanalysis of two user identification schemes with key distribution preserving anonymity, in: Proceedings of the ICICS'05, LNCS, vol. 3783, 2005, pp. 315-322.
    • E.-J. Yoon, K.-Y. Yoo, Cryptanalysis of two user identification schemes with key distribution preserving anonymity, in: Proceedings of the ICICS'05, LNCS, vol. 3783, 2005, pp. 315-322.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.