...
首页> 外文期刊>International Journal of Information Security >Password-authenticated key exchange based on RSA
【24h】

Password-authenticated key exchange based on RSA

机译:基于RSA的经过密码验证的密钥交换

获取原文
获取原文并翻译 | 示例

摘要

There have been many proposals in recent years for password-authenticated key exchange protocols, i.e., protocols in which two parties who share only a short secret password perform a key exchange authenticated with the password. However, the only ones that have been proven secured against offline dictionary attacks were based on Diffie–Hellman key exchange. We examine how to design a secure password-authenticated key exchange protocol based on RSA. In this paper, we first look at the OKE and protected-OKE protocols (both RSA-based) and show that they are insecure. Then we show how to modify the OKE protocol to obtain a password-authenticated key exchange protocol that can be proven secure (in the random oracle model). This protocol is very practical; in fact, it requires about the same amount of computation as the Diffie–Hellman-based protocols. Finally, we present an augmented protocol that is resilient to server compromise, meaning (informally) that an attacker who compromises a server would not be able to impersonate a client, at least not without running an offline dictionary attack against that client’s password.
机译:近年来,对于口令认证的密钥交换协议提出了许多建议,即其中仅共享短秘密口令的两个方执行用口令认证的密钥交换的协议。但是,唯一经证明可防止脱机字典攻击的方法是基于Diffie-Hellman密钥交换的。我们研究如何设计基于RSA的安全的,经过密码验证的密钥交换协议。在本文中,我们首先查看OKE和受保护的OKE协议(均基于RSA),并证明它们是不安全的。然后,我们展示了如何修改OKE协议以获得可以证明是安全的(在随机oracle模型中)经过密码验证的密钥交换协议。该协议非常实用。实际上,它需要与基于Diffie-Hellman的协议相同的计算量。最后,我们提出了一种增强的协议,可以抵御服务器的攻击,这(非正式地)意味着,攻击服务器的攻击者将无法模拟客户端,至少在没有对该客户端的密码进行脱机字典攻击的情况下。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号