首页> 外文会议>International Conference on Cryptology and Network Security >Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09
【24h】

Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09

机译:CANS'09的可证实安全跨领域客户端密码认证密钥协议协议的密码分析

获取原文

摘要

In this paper, we cryptanalyze the recent smart card based client-to-client password-authenticated key agreement (C2C-PAKA-SC) protocol for cross-realm settings proposed at CANS '09. While client-to-client password-authenticated key exchange (C2C-PAKE) protocols exist in literature, what is interesting about this one is that it is the only such protocol claimed to offer security against password compromise impersonation without depending on public-key cryptography, and is one of the few C2C-PAKE protocols with provable security that has not been cryptanalyzed. We present three impersonation attacks on this protocol; the first two are easier to mount than the designer-considered password compromise impersonation. Our results are the first known cryptanalysis results on C2C-PAKA-SC.
机译:在本文中,我们将最近的基于智能卡的客户到客户端密码验证的密钥协议(C2C-PAKA-SC)协议进行了CANS'09所提出的跨领域设置。虽然在文献中存在客户端 - 客户端密码验证的密钥交换(C2C-PAUGE)协议,但对此有趣的是,这是一个唯一声称的唯一索取危险性危害冒险的协议,而无需取决于公钥密码学,并是少数几个具有尚未密码分析的C2C-PANT协议之一。我们对本协议提出了三次冒充攻击;前两个比设计师所考虑的密码妥协模拟更容易安装。我们的结果是C2C-PAKA-SC的第一个已知的密码分析结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号