Weakness in a RSA-based password authenticated key exchange protocol

Taek Young Youn, Young Ho Park, Changhan Kim, Jongin Lim

    Research output: Contribution to journalArticlepeer-review

    6 Citations (Scopus)

    Abstract

    Recently, an efficient password-authenticated key exchange protocol based on RSA has been proposed by Park et al. with formal security proof. In this letter, we analyze their protocol, and show that, unfortunately, it is insecure against an adversary who performs a dictionary attack.

    Original languageEnglish
    Pages (from-to)339-342
    Number of pages4
    JournalInformation Processing Letters
    Volume108
    Issue number6
    DOIs
    Publication statusPublished - 2008 Nov 30

    Bibliographical note

    Funding Information:
    ✩ This research was supported by the MKE (Ministry of Knowledge Economy), Korea, under the ITRC (Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Advancement) (IITA-2008-(C1090-0801-0025)). * Corresponding author. E-mail addresses: [email protected] (T.-Y. Youn), [email protected] (Y.-H. Park), [email protected] (C. Kim), [email protected] (J. Lim).

    Keywords

    • Cryptography
    • Dictionary attack
    • Key exchange
    • Password
    • RSA

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • Signal Processing
    • Information Systems
    • Computer Science Applications

    Fingerprint

    Dive into the research topics of 'Weakness in a RSA-based password authenticated key exchange protocol'. Together they form a unique fingerprint.

    Cite this