【24h】

Practical Authenticated Key Agreement Using Passwords

机译:实用的使用密码的经过身份验证的密钥协议

获取原文
获取原文并翻译 | 示例

摘要

Due to the low entropy of human-memorable passwords, it is not easy to conduct password authenticated key agreement in a secure manner. Though there are many protocols achieving this goal, they may require a large amount of computation specifically in the augmented model which was contrived to resist server compromise. Our contribution in this paper is two fold. First, we propose a new practical password authenticated key agreement protocol that is efficient and generic in the augmented model. Our scheme is considered from the practical perspective (in terms of efficiency) and is provably secure under the Diffie-Hellman intractability assumptions in the random-oracle model. Our second contribution is more realistic and generic; a conceptually simple but novel password guessing attack which can be mounted on every three-pass password-based protocol unless care is taken in both the design and implementation phases. This is due to the server's failure to synchronize multiple simultaneous requests. Experimental results and possible prevention methods are also discussed.
机译:由于易于记忆的密码的熵少,以安全的方式进行密码认证的密钥协商并不容易。尽管有许多协议可以实现此目标,但是它们可能需要专门在增强模型中进行大量计算以抵御服务器危害。我们在本文中的贡献有两个方面。首先,我们提出了一种新的实用的密码认证密钥协商协议,该协议在增强模型中是有效且通用的。我们的方案从实用角度考虑(从效率方面),并且在随机预言模型中的Diffie-Hellman难处理性假设下可证明是安全的。我们的第二个贡献是更加现实和通用。一种概念上简单但新颖的密码猜测攻击,除非在设计和实施阶段都加以注意,否则它可以安装在每个基于三遍密码的协议上。这是由于服务器无法同步多个并发请求。还讨论了实验结果和可能的预防方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号