Efficient Key Exchange and Authentication Protocols Protecting Weak Secrets
スポンサーリンク
概要
- 論文の詳細を見る
We propose new key exchange and authentication protocols, which are efficient in protecting a poorly-chosen weak secret from guessing attacks, based on the use of a one-time pad and a strong one-way hash function. Cryptographic protocols assume that a strong secret should be shared between communication participants for authentication, in the light of an ever-present threat of guessing attacks. Cryptographically long secret would be better for security only if ordinary users could remember it. But most users choose an easy-to-remember pass-word as a secret and such a weak secret can be guessed easily. In our previous work [1], we made much of introducing a basic concept and its application. In this paper, we describe our idea in more detail and propose more protocols which correspond to variants of our basic protocol using well-defined notations. Formal verification and efficiency comparison of the proposed protocols are also presented. By our scheme the password guessing attacks are defeated efticiently, and a session key is exchanged and participants are authenticated securely.
- 社団法人電子情報通信学会の論文
- 1998-01-25
著者
-
Song J
Seoul National Univ. Seoul Kor
-
Song Jooseok
Department Of Computer Science Yonsei University
-
Kwon T
Univ. California Berkeley Usa
-
Kwon Taekyoung
Department Of Computer Engineering Sejong University
関連論文
- An Interactive Identification Scheme Based on Quadratic Residue Problem
- Energy-Efficient Vertical Handover Mechanism
- Optical Burst Switching with Limited Deflection Routing Rules(The IEICE Transactions on Communications, Vol.E86-B, No.5)
- Optical Burst Switching with Limited Deflection Routing Rules ( Recent Progress in Optoelectronics and Communications)
- An Integrated Call Admission Control in ATM Networks
- A Study on the Generalized Key Agreement and Password Authentication Protocol
- Efficient Key Exchange and Authentication Protocols Protecting Weak Secrets
- An Improvement of the Password-Based Authentication Protocol (K1P) on Security against Replay Attacks
- Removing Unnecessary Buffers and Timers in EDF Scheduler with Regulators in Fixed-Sized Packet Networks(Network)
- Removing Unnecessary Buffers and Timers in EDF Scheduler with Regulators in Fixed-Sized Packet Networks
- Efficient and Secure Key Agreement for Merging Clusters in Ad-Hoc Networking Environments(Fundamental Theories for Communications)