Password-based Authenticated Key Agreement Protocol Secure Against Advanced Modification Attack


The KIPS Transactions:PartC, Vol. 11, No. 3, pp. 277-286, Jun. 2004
10.3745/KIPSTC.2004.11.3.277,   PDF Download:

Abstract

Password-based mechanism is widely used methods for user authentication. Password-based mechanisms are using memorable passwords(weak secrets), therefore password-based mechanisms are vulnerable to the password guessing attack. To overcome this problem, many password-based authenticated key exchange protocols have been proposed to resist password guessing attacks. Recently, Seo-Sweeny proposed password-based Simple Authenticated Key Agreement(SAKA) protocol. In this paper, first, we will examine the SAKA and authenticated key agreement protocols, and then we will show that the proposed simple authenticated key agreement protocols are still insecure against Advanced Modification Attack. And we propose a Password-based Simple Authenticated Key Agreement Protocol secure against Advanced Modification Attack.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
J. Kwak, S. H. Oh, H. K. Yang, D. H. Won, "Password-based Authenticated Key Agreement Protocol Secure Against Advanced Modification Attack," The KIPS Transactions:PartC, vol. 11, no. 3, pp. 277-286, 2004. DOI: 10.3745/KIPSTC.2004.11.3.277.

[ACM Style]
Jin Kwak, Soo Hyun Oh, Hyung Kyu Yang, and Dong Ho Won. 2004. Password-based Authenticated Key Agreement Protocol Secure Against Advanced Modification Attack. The KIPS Transactions:PartC, 11, 3, (2004), 277-286. DOI: 10.3745/KIPSTC.2004.11.3.277.