About Validity Checks of Augmented PAKE in IEEE 1363.2 and ISO/IEC 11770-4
スポンサーリンク
概要
- 論文の詳細を見る
An augmented PAKE (Password-Authenticated Key Exchange) protocol provides password-only authentication in the presence of an attacker, establishment of session keys between the involving parties, and extra protection for server compromise (i.e., exposure of password verification data). Among many augmented PAKE protocols, AMP variants (AMP2 [16] and AMP+ [15]) have been standardized in IEEE 1363.2 [9] and ISO/IEC 11770-4 [10]. In this paper, we thoroughly investigate APKAS-AMP (based on AMP2 [16]) and KAM3 (based on AMP+ [15]) which require several validity checks on the values, received and computed by the parties, when using a secure prime. After showing some attacks on APKAS-AMP and KAM3, we suggest new sanity checks that are clear and sufficient to prevent an attacker from doing these attacks.
著者
-
Shin Seonghan
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science An
-
Kobara Kazukuni
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
-
SHIN SeongHan
Research Institute for Secure Systems (RISEC), National Institute of Advanced Industrial Science and Technology (AIST)
関連論文
- An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions
- Anonymous Password-Authenticated Key Exchange : New Construction and Its Extensions
- A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
- A New Security Architecture for Personal Networks and Its Performance Evaluation
- RSA-Based Password-Authenticated Key Exchange, Revisited
- A Secure Authenticated Key Exchange Protocol for Credential Services
- An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction(Information Security)
- Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way
- Asymmetric RFID System Secure against Active Attack
- IVs to Skip for Immunizing WEP against FMS Attack
- Key-Dependent Weak IVs and Weak Keys in WEP : How to Trace Conditions Back to Their Patterns(Information Security)
- Security Analysis of Two Augmented Password-Authenticated Key Exchange Protocols
- Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks
- About Validity Checks of Augmented PAKE in IEEE 1363.2 and ISO/IEC 11770-4