454 Hits in 5.8 sec

Extended password key exchange protocols immune to dictionary attack

D.P. Jablon
Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises  
We describe a new extension to further limit exposure to theft of a stored password-verifier, and apply it to several protocols including the Simple Password Exponential Key Exchange (SPEKE).  ...  Strong password methods verify even small passwords over a network without additional stored keys or certificates with the user, and without fear of network dictionary attack.  ...  Since K 2 is presumed to have low entropy, the secondary DH exchange could permit dictionary attack by an eavesdropper.  ... 
doi:10.1109/enabl.1997.630822 dblp:conf/wetice/Jablon97 fatcat:jkqs4bagmrca5fj4vjhnthdvwu

Secure Encryption scheme with key exchange for Two server Architecture [article]

D Siva Santosh Kumar, Dasari Kalyani
2017 arXiv   pre-print
In order to improve the efficiency and performance of the authentication scheme, we introduce multiple servers to store the passwords and participate in the key exchange and authentication schemes.  ...  In this paper, we model a safe and secure password-based authentication scheme using a key exchange.  ...  SECURITY ANALYSIS Our protocol ensures mutual authentication among the user and multiple servers and is presumed to be immune as far as tested with replay attack, offline dictionary attack, the authentication  ... 
arXiv:1712.04817v1 fatcat:jn2envaibbg5leutpsgdf3ne3y

Cryptanalysis of Two Password-Authenticated Key Exchange Protocols [chapter]

Zhiguo Wan, Shuhong Wang
2004 Lecture Notes in Computer Science  
Password-Authenticated Key Exchange (PAKE) protocols enable two or more parties to use human-memorable passwords for authentication and key exchange.  ...  Since the human-memorable passwords are vulnerable to off-line dictionary attacks, PAKE protocols should be very carefully designed to resist dictionary attacks.  ...  Acknowledgments The authors would like to thank the anonymous reviewers for their valuable suggestions and Feng Bao for his insightful remarks and helpful discussion.  ... 
doi:10.1007/978-3-540-27800-9_15 fatcat:yj7mj2v5zfawtliklbsevssyzu

Extensible Authentication Protocol Overview and Its Applications

Heung Youl YOUM
2009 IEICE transactions on information and systems  
In this paper, we analyze the most widely deployed EAP methods ranging from the EAP-TLS [27] to the EAP-PSK [25] .  ...  EAP is used as a useful tool for enabling user authentication and distribution of session keys.  ...  Replay protection: All messages exchanged by EAP must be replay-protected. Resistance to dictionary attacks: This refers to the immunity to dictionary attacks.  ... 
doi:10.1587/transinf.e92.d.766 fatcat:bvq4vmrwrve63harw7nsclv4mm

Strong password-only authenticated key exchange

David P. Jablon
1996 Computer communication review  
It belongs to an exclusive class of methods which provide authentication and key establishment over an insecure channel using only a small password, without risk of offline dictionary attack.  ...  Since the early 1990's, an increased focus on the problem has yielded a few novel solutions, specially designed to resist to dictionary attack.  ...  Using only a small password, these methods provide authentication and key establishment over an insecure channel, and are immune to offline dictionary attack.  ... 
doi:10.1145/242896.242897 fatcat:ygywkbyjgfhgfgnghp5lf27mni

Simple Three Party Key Exchange Protocol via Twin Diffie-Hellman Problem

H. K. Pathak, Manju Sanghi
2013 International Journal of Network Security  
authenticated key exchange protocols.  ...  In this paper, we propose two password based simple three party key exchange protocols via twin Diffie-Hellman problem and show that the proposed protocols provide greater security and efficiency than  ...  In 1992, Bellovin and Merrit [5] proposed the first encrypted key exchange (EKE) family of key exchange protocols, which allow people to use easy to remember passwords without being threatened by dictionary  ... 
dblp:journals/ijnsec/PathakS13 fatcat:ccmdmcc6s5hinmdsf6z2xokl34

Efficient Password-Based Authenticated Key Exchange from Lattices

Yi Ding, Lei Fan
2011 2011 Seventh International Conference on Computational Intelligence and Security  
One must ensure that protocols are immune to off-line dictionary attacks in which an adversary exhaustively enumerates all possible passwords in an attempt to determine the correct one.  ...  Protocols for password-based authenticated key exchange (PAKE) allow two users who share only a short, low-entropy password to agree on a cryptographically strong session key.  ...  The authors would like to thank anonymous referees for valuable comments. Yi Ding would like to thank Prof.  ... 
doi:10.1109/cis.2011.210 dblp:conf/cis/DingF11a fatcat:kfsq4bjlkbd2jflmubyzgnlhde

Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM [chapter]

Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, Taekyoung Kwon
2016 Lecture Notes in Computer Science  
In this paper, we propose an efficient identity-based password authenticated key exchange (IBPAKE) protocol using identitybased KEM/DEM.  ...  A distinctive feature of IBPAKE protocols, compared to the well-known EKE-type PAKE protocols, is that an adversary who even acquired a user's password cannot impersonate a server to further investigate  ...  Our protocols give resistance to server impersonation attacks. That is, even if a password is revealed from a client, a server impersonation attack can be prevented effectively.  ... 
doi:10.1007/978-3-319-31875-2_34 fatcat:ljsumf7w3vfplcm4eafzeaxzi4

Leakage-Resilient Authenticated Key Establishment Protocols [chapter]

SeongHan Shin, Kazukuni Kobara, Hideki Imai
2003 Lecture Notes in Computer Science  
And we extend our protocols to be possible for updating secret values registered in server(s) or password remembered by a client.  ...  Authenticated Key Establishment (AKE) protocols enable two entities, say a client (or a user) and a server, to share common session keys in an authentic way.  ...  Acknowledgements The authors would like to thank anonymous referees for useful comments.  ... 
doi:10.1007/978-3-540-40061-5_10 fatcat:lesfykc63ja4veoixx3vdrbrza

Two-Factor Authentication with End-to-End Password Security [chapter]

Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena
2018 Lecture Notes in Computer Science  
' passwords, and perform active and passive attacks, online and oine.  ...  Security is end-to-end" in the sense that the attacker can attack all parts of the system, including all communication links and any subset of parties (servers, devices, client terminals), can learn users  ...  active attacks on the key exchange in step I or (2) when A attacks the SAS-MA sub-protocol and gets D to accept M C * = M C or (3) A sends e * D = e D to C.  ... 
doi:10.1007/978-3-319-76581-5_15 fatcat:45ip4zwpqjb7vjrpbz2aiwmpmy

Comparative studies on authentication and key exchange methods for 802.11 wireless LAN

Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan
2007 Computers & security  
In particular, its authentication and key exchange (AKE) aspects, which form a vital building block for modern security mechanisms, deserve further investigation.  ...  In this paper we first identify the general requirements used for WLAN authentication and key exchange (AKE) methods, and then classify them into three levels (mandatory, recommended, and additional operational  ...  the access point, an attacker can easily fool the network via deploying a rogue access point; (5) Immune to forgery attacks -an attacker may forge the public key pair so that he could be validly verified  ... 
doi:10.1016/j.cose.2007.01.001 fatcat:33zjq6anzvei7cjoiedy5nfpzy

Password-based Encrypted Group Key Agreement

Ratna Dutta, Rana Barua
2006 International Journal of Network Security  
This paper presents an efficient password-based authenticated encrypted group key agreement protocol immune to dictionary attack under the computation Diffie-Hellman (CDH) assumption.  ...  While designing such protocols, one should limit the number of on-line password guessing and achieve the security against dictionary attack.  ...  There are several works extending 2-party Diffie-Hellman key exchange protocols to multi-party setting.  ... 
dblp:journals/ijnsec/DuttaB06 fatcat:n6wttfgzxzaijpfmb5iinp5a74

EAP methods for wireless networks

Ram Dantu, Gabriel Clothier, Anuj Atri
2007 Computer Standards & Interfaces  
A number of specific widely used EAP methods are examined and evaluated for their advantages and susceptibility to types of attack.  ...  This paper presents an overview and analysis of Extensible Authentication Protocol (EAP) and its place in securing wireless LANs.  ...  In addition, the mechanism is not as sensitive to dictionary attacks as other password based methods.  ... 
doi:10.1016/j.csi.2006.04.001 fatcat:ld4ll7eztbcrlj5b5sjve6xtiq

Analysing and Patching SPEKE in ISO/IEC [article]

Feng Hao, Roberto Metere, Siamak F. Shahandashti, Changyu Dong
2018 arXiv   pre-print
Simple Password Exponential Key Exchange (SPEKE) is a well-known Password Authenticated Key Exchange (PAKE) protocol that has been used in Blackberry phones for secure messaging and Entrust's TruePass  ...  We identify that the protocol is vulnerable to two new attacks: an impersonation attack that allows an attacker to impersonate a user without knowing the password by launching two parallel sessions with  ...  If the attacker is directly engaging in the key exchange, he should be limited to guess only one password per protocol execution. Implicit key authentication.  ... 
arXiv:1802.04900v2 fatcat:m4cqw7f4zbc7xemh633a7z2uui

ID-Based Group Password-Authenticated Key Exchange [chapter]

Xun Yi, Raylin Tso, Eiji Okamoto
2009 Lecture Notes in Computer Science  
A password-based AKE (i.e., PAKE) has to be immune to the dictionary attack, in which an adversary exhaustively tries all possible passwords from a dictionary in order to determine the correct one.  ...  Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret key used for authentication is a human-memorable password.  ...  Protocol P is a secure protocol for password-authenticated key exchange if, for all dictionary size N and for all PPT adversaries A making at most Q(k) online attacks, there exists a negligible function  ... 
doi:10.1007/978-3-642-04846-3_13 fatcat:lkarrsj4brgzxka7tuvfp4z4za
« Previous Showing results 1 — 15 out of 454 results