메뉴 건너뛰기




Volumn 57, Issue 1, 2009, Pages

Efficient and secure authenticated key exchange using weak passwords

Author keywords

Authentication; Cryptography; Passwords

Indexed keywords

AUTHENTICATED KEY EXCHANGE; CRYPTOGRAPHIC ASSUMPTIONS; CRYPTOGRAPHIC KEY; DIFFIE-HELLMAN ASSUMPTION; DIFFIE-HELLMAN KEY EXCHANGE; ENGLISH WORD; INSECURE NETWORKS; MUTUAL AUTHENTICATION; OFF-LINE DICTIONARY ATTACKS; PUBLIC KEYS; SECURE COMMUNICATIONS; SECURE PROTOCOLS;

EID: 71449093776     PISSN: 00045411     EISSN: 1557735X     Source Type: Journal    
DOI: 10.1145/1613676.1613679     Document Type: Article
Times cited : (77)

References (50)
  • 6
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attacks
    • IEEE Computer Society Press, Los Alamitos, CA
    • BELLOVIN, S. M., AND MERRITT, M. 1992. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In Proceedings of the IEEE Symposium on Security & Privacy. IEEE Computer Society Press, Los Alamitos, CA, 72-84.
    • (1992) Proceedings of the IEEE Symposium on Security & Privacy , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 7
    • 0027741529 scopus 로고
    • Augmented encrypted key exchange: A passwordbased protocol secure against dictionary attacks and password file compromise
    • ACM, New York
    • BELLOVIN, S. M., AND MERRITT, M. 1993. Augmented encrypted key exchange: A passwordbased protocol secure against dictionary attacks and password file compromise. In Proceedings of the 1st ACM Conference on Computer and Communications Security. ACM, New York, 244-250.
    • (1993) Proceedings of the 1st ACM Conference on Computer and Communications Security , pp. 244-250
    • Bellovin, S.M.1    Merritt, M.2
  • 11
    • 4243180376 scopus 로고    scopus 로고
    • The random oracle methodology, revisited
    • CANETTI, R., GOLDREICH, O., AND HALEVI, S. 2004. The random oracle methodology, revisited. J. ACM 51, 4, 557-594.
    • (2004) J. ACM , vol.51 , Issue.4 , pp. 557-594
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 15
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • CRAMER, R., AND SHOUP, V. 2003. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput. 33, 1, 167-226.
    • (2003) SIAM J. Comput. , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 19
    • 0017018484 scopus 로고
    • New directions in cryptography
    • DIFFIE, W., AND HELLMAN, M. E. 1976. New directions in cryptography. IEEE Trans. Inf. Theory 22, 6, 644-654.
    • (1976) IEEE Trans. Inf. Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 21
    • 0343337504 scopus 로고    scopus 로고
    • Nonmalleable cryptography
    • DOLEV, D., DWORK, C., AND NAOR, M. 2000. Nonmalleable cryptography. SIAM J. Comput. 30, 2, 391-437.
    • (2000) SIAM J. Comput. , vol.30 , Issue.2 , pp. 391-437
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 22
    • 0003157491 scopus 로고    scopus 로고
    • On-line/off-line digital signatures
    • EVEN, S.,GOLDREICH, O., AND MICALI, S. 1996. On-line/off-line digital signatures. J. Crypt. 9, 1, 35-67.
    • (1996) J. Crypt. , vol.9 , Issue.1 , pp. 35-67
    • Even, S.1    Goldreich, O.2    Micali, S.3
  • 24
    • 33748310753 scopus 로고    scopus 로고
    • A framework for password-based authenticated key exchange
    • GENNARO, R., AND LINDELL, Y. 2006. A framework for password-based authenticated key exchange. ACM Trans. Inf. Syst. Secur. 9, 2, 181-234.
    • (2006) ACM Trans. Inf. Syst. Secur. , vol.9 , Issue.2 , pp. 181-234
    • Gennaro, R.1    Lindell, Y.2
  • 25
    • 33745184723 scopus 로고    scopus 로고
    • Session-key generation using human passwords only
    • GOLDREICH, O., AND LINDELL, Y. 2006. Session-key generation using human passwords only. J. Crypt. 19, 3, 241-340.
    • (2006) J. Crypt. , vol.19 , Issue.3 , pp. 241-340
    • Goldreich, O.1    Lindell, Y.2
  • 26
    • 0023985465 scopus 로고
    • Adigital signature scheme secure against adaptive chosen-message attacks
    • GOLDWASSER, S.,MICALI, S., AND RIVEST,R.L. 1988. Adigital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17, 2, 281-308.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 27
    • 0029531472 scopus 로고
    • Optimal authentication protocols resistant to password guessing attacks
    • IEEE Computer Society Press, Los Alamitos, CA
    • GONG, L. 1995. Optimal authentication protocols resistant to password guessing attacks. In Proceedings of the 8th IEEE Computer Security FoundationsWorkshop. IEEE Computer Society Press, Los Alamitos, CA, 24-29.
    • (1995) Proceedings of the 8th IEEE Computer Security FoundationsWorkshop , pp. 24-29
    • Gong, L.1
  • 29
    • 71849087704 scopus 로고    scopus 로고
    • Public-key cryptography and password protocols
    • HALEVI, S., AND KRAWCZYK, H. 1999. Public-key cryptography and password protocols. ACM Trans. Inf. Syst. Secur. 2, 3, 230-268.
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.3 , pp. 230-268
    • Halevi, S.1    Krawczyk, H.2
  • 39
    • 84957025686 scopus 로고    scopus 로고
    • Open key exchange: How to defeat dictionary attacks without encrypting public keys
    • Springer-Verlag, Berlin, Germany
    • LUCKS, S. 1997. Open key exchange: How to defeat dictionary attacks without encrypting public keys. In Security ProtocolsWorkshop. Lecture Notes in Computer Science, vol.1361. Springer-Verlag, Berlin, Germany, 79-90.
    • (1997) Security ProtocolsWorkshop Lecture Notes in Computer Science , vol.1361 , pp. 79-90
    • Lucks, S.1
  • 42
    • 0018543411 scopus 로고
    • Password security-a case history
    • MORRIS, R., AND THOMPSON,K. 1979. Password security-a case history. Comm. ACM22, 11, 594-597.
    • (1979) Comm. ACM22 , vol.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 43
    • 38849201191 scopus 로고    scopus 로고
    • Simpler session-key generation from short random passwords
    • NGUYEN,M.-H., AND VADHAN, S. 2008. Simpler session-key generation from short random passwords. J. Crypt. 21, 1, 52-96.
    • (2008) J. Crypt. , vol.21 , Issue.1 , pp. 52-96
    • Nguyen, M.-H.1    Vadhan, S.2
  • 44
    • 0030648441 scopus 로고    scopus 로고
    • Number theoretic attacks on secure password schemes
    • IEEE Computer Society Press, Los Alamitos, CA
    • PATEL, S. 1997. Number theoretic attacks on secure password schemes. In Proceedings of the IEEE Symposium on Security & Privacy. IEEE Computer Society Press, Los Alamitos, CA, 236-247.
    • (1997) Proceedings of the IEEE Symposium on Security & Privacy , pp. 236-247
    • Patel, S.1
  • 45
    • 0004023090 scopus 로고    scopus 로고
    • On formal models for secure key exchange
    • SHOUP, V. 1999. On formal models for secure key exchange. Tech. rep. RZ 3120, IBM. http://eprint.iacr.org/1999/012.
    • (1999) Tech. Rep. RZ 3120, IBM.
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.