首页> 外文期刊>IEEE transactions on dependable and secure computing >Security Analysis of Password-Authenticated Key Retrieval
【24h】

Security Analysis of Password-Authenticated Key Retrieval

机译:密码验证密钥检索的安全性分析

获取原文
获取原文并翻译 | 示例

摘要

A PAKR (Password-Authenticated Key Retrieval) protocol and its multi-server system allow one party (say, client), who has a memorable password, to retrieve a long-term static key in an exchange of messages with at least one other party (say, server) that has a private key associated with the password. In this paper, we analyze the only PAKR (named as PKRS-1) standardized in IEEE 1363.2 [9] and its multi-server system (also, [12]) by showing that any passive/ active attacker can find out the client's password and the static key with off-line dictionary attacks. This result contradicts the security claims made for PKRS-1 (see Clause 10.2 of IEEE 1363.2 [9]).
机译:PAKR(密码授权密钥检索)协议及其多服务器系统允许具有难忘密码的一方(例如,客户端)在与至少另一方交换消息时检索长期静态密钥。 (例如,服务器)具有与密码相关联的私钥。在本文中,我们通过证明任何被动/主动攻击者都能找到客户端的密码,来分析IEEE 1363.2 [9]及其多服务器系统(也[12])中标准化的唯一PAKR(称为PKRS-1)。以及带有离线字典攻击的静态密钥。该结果与针对PKRS-1提出的安全性要求相矛盾(请参阅IEEE 1363.2 [9]的条款10.2)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号