首页> 外文会议>International Conference on Data and Knowledge Engineering >Weaknesses of 'Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol'
【24h】

Weaknesses of 'Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol'

机译:“安全分析和增强三方密码的经过认证密钥交换协议”的弱点

获取原文

摘要

The three-party password-based authenticated key exchange (3PAKE) protocol allows two users to share a session key for future communication with the help of a trusted server in the public network. Recently, Zhao et al. [Zhao J., Gu D., Zhang L., Security analysis and enhancement for three-party password-based authenticated key exchange protocol, Security Communication Networks 2012; 5(3):273-278] proposed an efficient 3PAKE protocol using smart cards. They proved that their protocol can withstand various known attacks found in the previously published schemes. However, in this paper, we point out that their protocol is vulnerable to three kinds of attacks namely, off-line password-guessing attack, privileged insider attack and stolen smart card attack. Hence, Zhao et al.'s scheme is not recommended for practical applications.
机译:基于三方密码的经过身份验证的密钥交换(3Pake)协议允许两个用户在公共网络中的可信服务器的帮助下共享会话密钥以供将来通信。最近,赵等人。 [Zhao J.,GU D.,Zhang L.,基于三方密码的经过认证密钥交换协议,安全通信网络2012的安全分析和增强; 5(3):273-278]使用智能卡提出了一种有效的3PAKE协议。他们证明,他们的协议可以承受先前发表的方案中发现的各种已知攻击。但是,在本文中,我们指出了他们的协议很容易受到三种攻击,即离线密码猜测攻击,特权内幕攻击并偷走智能卡攻击。因此,赵等人。不建议为实际应用推荐的方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号