Efficient three-party key exchange protocols with round efficiency
- Authors
- Youn, Taek-Young; Kang, Eun Sook; Lee, Changhoon
- Issue Date
- 2월-2013
- Publisher
- SPRINGER
- Keywords
- Cryptanalysis; Password; Key exchange; Three-party setting; Password guessing attack
- Citation
- TELECOMMUNICATION SYSTEMS, v.52, no.2, pp.1367 - 1376
- Indexed
- SCIE
SCOPUS
- Journal Title
- TELECOMMUNICATION SYSTEMS
- Volume
- 52
- Number
- 2
- Start Page
- 1367
- End Page
- 1376
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/104103
- DOI
- 10.1007/s11235-011-9649-3
- ISSN
- 1018-4864
- Abstract
- Recently, Guo et al. discovered some security flaws of the simple three-party key exchange protocol proposed by Lu and Cao, and proposed an improved protocol. Independently, Chung and Ku also showed some weaknesses of Lu and Cao's protocol, and provided an improved protocol. In this paper, we review some insecurity of Lu and Cao's protocol and analyze two improved protocols proposed by Guo et al. and Chung and Ku. Then we show that the protocols are still insecure. They are vulnerable to an adversary who performs an off-line password guessing attack. We provide a countermeasure by performing detailed analysis on the security flaws in two improved protocols. We also propose a secure three-party password-authenticated key exchange protocol which requires three rounds.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - College of Science and Technology > Department of AI Cyber Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.