Abstract
Authentication and key exchange are fundamental for establishing secure communication channels over public insecure networks. Password-based protocols for authenticated key exchange are designed to work even when user authentication is done via the use of passwords drawn from a small known set of values. Recently, Wen et al. (H.-A. Wen, T.-F. Lee, T. Hwang, Provably secure three-party password-based authenticated key exchange protocol using Weil pairing, IEE Proceedings-Communications 152 (2) (2005) 138-143) proposed a new protocol for password-based authenticated key exchange in the three-party setting, where the clients trying to establish a common secret key do not share a password between themselves but only with a trusted server. Wen et al.'s protocol carries a claimed proof of security in a formal model of communication and adversarial capabilities. However, this work shows that the protocol for three-party key exchange is completely insecure and the claim of provable security is seriously incorrect. We conduct a detailed analysis of flaws in the protocol and its security proof, in the hope that no similar mistakes are made in the future.
| Original language | English |
|---|---|
| Pages (from-to) | 1364-1375 |
| Number of pages | 12 |
| Journal | Information Sciences |
| Volume | 177 |
| Issue number | 6 |
| DOIs | |
| Publication status | Published - 2007 Mar 15 |
| Externally published | Yes |
Bibliographical note
Funding Information:We would like to thank the anonymous referees for their suggestions which significantly improved this paper. This work was supported by the Korean Ministry of Information and Communication under the ITRC (Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Assessment).
Keywords
- Key exchange protocol
- Man-in-the-middle attack
- Password-based authentication
- Provable security
- Weil pairing
ASJC Scopus subject areas
- Theoretical Computer Science
- Software
- Control and Systems Engineering
- Computer Science Applications
- Information Systems and Management
- Artificial Intelligence
Fingerprint
Dive into the research topics of 'Security weakness in a three-party pairing-based protocol for password authenticated key exchange'. Together they form a unique fingerprint.Cite this
- APA
- Standard
- Harvard
- Vancouver
- Author
- BIBTEX
- RIS