Password-only Authenticated Key Agreement Protocols Based on Self-certified Approach Tzong-Chen Wu and Yen-Ching Lin Department of Information Management.

Slides:



Advertisements
Similar presentations
TCC 2006 Research on Password-Authenticated Group Key Exchange Jeong Ok Kwon, Ik Rae Jeong, and Dong Hoon Lee (CIST, Korea Univ.) Kouchi Sakurai (Kyushu.
Advertisements

1 東南技術學院九十二學年度第二學期 資工系第一次論文發表會 Analysis of an Improved Version of S/KEY One-Time Password Authentication Scheme Speaker: Maw-Jinn Tsaur
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
Interlock Protocol - Akanksha Srivastava 2002A7PS589.
Public-key based. Public-key Techniques based Protocols –may use either weak or strong passwords –high computation complexity (Slow) –high deployment.
Public Key Algorithms …….. RAIT M. Chatterjee.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
1 Three-Party Encrypted Key Exchange Without Server Public-Keys C. L. Lin, H. M. Sun, M. Steiner, and T. Hwang IEEE COMMUNICATIONS LETTER, VOL. 5, NO.12,
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
CMSC 414 Computer (and Network) Security Lecture 21 Jonathan Katz.
1 Security analysis of an enhanced authentication key exchange protocol Authors : H.Y. Liu, G.B. Horng, F.Y. Hung Presented by F.Y. Hung Date : 2005/5/20.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
電子商務與數位生活研討會 1 Further Security Enhancement for Optimal Strong-Password Authentication Protocol Tzung-Her Chen, Gwoboa Horng, Wei-Bin Lee,Kuang-Long Lin.
A password authentication scheme with secure password updating SEC 期末報告 學號: 姓名:翁玉芬.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
Analysis of Key Agreement Protocols Brita Vesterås Supervisor: Chik How Tan.
Certificateless Authenticated Two-Party Key Agreement Protocols
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
1 An ID-based multisignature scheme without reblocking and predetermined signing order Chin-Chen Chang, Iuon-Chang Lin, and Kwok-Yan Lam Computer Standards.
A more efficient and secure dynamic ID- based remote user authentication scheme Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao, Jing Dan in Computer Communications.
國立清華大學資訊工程系 資訊安全實驗室 孫宏民 博士 Phone: Authenticated Key Exchange Protocols.
國立清華大學資訊工程系 資訊安全實驗室 孫宏民 Phone: Network Security --- Network Security --- Key Establishment Protocols.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Computer Science Public Key Management Lecture 5.
Cryptanalysis of Two Dynamic ID-based Authentication
Key Management and Diffie- Hellman Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther.
Cyrtographic Security Identity-based Encryption 1Dennis Kafura – CS5204 – Operating Systems.
Key Agreement Guilin Wang School of Computer Science 12 Nov
Cryptography and Network Security (CS435) Part Eight (Key Management)
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
CIST/ETRI/ISIT/KDDI/Kyusyu Univ./NICT Joint Research Workshop on Ubiquitous Network Security 2005 Verifier-Based Password-Authenticated Key Exchange Jeong.
© UCL Crypto group Nov-15 Two Formal Views of Authenticated Group Diffie-Hellman Key Exchange E. Bresson (ENS), O. Chevassut (LBL, UCL), O. Pereira (UCL)
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
1 Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards 使用在 smart cards 的強韌及高效率密碼驗證金鑰協定 IEEE Transactions on Industrial Electronics,
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks Hyeran Mun, Kyusuk Han, Yan Sun Lee, Chan Yeob Yeun, Hyo.
Cryptography and Network Security Key Management and Other Public Key Cryptosystems.
Department of Computer Engineering, Kyungpook National University Author : Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo Speaker : Wan-Soo Lee
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Authenticated Key Exchange I. Definitions I. MAP I. matching conversations II. oracles II. (I)KA II. AKEP2 III. AKEP2 Security I. Session Keys II. Perfect.
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
King Mongkut’s University of Technology Network Security 8. Password Authentication Methods Prof. Reuven Aviv, Jan Password Authentication1.
Password-based user authentication and key distribution protocols for client-server applications Authors: Her-Tyan Yeh and Hung-Min Sun Sources: The Journal.
Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile Devices * Junghyun Nam 1, Juryon Paik 2, Jeeyeon Kim 2,
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
Key Management Network Systems Security Mort Anvari.
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Threshold password authentication against guessing attacks in Ad hoc networks ► Chai, Zhenchuan; Cao, Zhenfu; Lu, Rongxing ► Ad Hoc Networks Volume: 5,
Fall 2006CS 395: Computer Security1 Key Management.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Computer Science Authenticated Group Key Agreement and Friends Giuseppe Ateniese, Michael Stiener and Gene Tsudik Presented by Young Hee Park November.
Threshold password authentication against guessing attacks in Ad hoc networks Authors: Zhenchuan Chai, Zhenfu Cao, Rongxing Lu Sources: Ad Hoc Networks,
Key Management public-key encryption helps address key distribution problems have two aspects of this: – distribution of public keys – use of public-key.
Non-PKI Methods for Public Key Distribution
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Key Management Network Systems Security
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

Password-only Authenticated Key Agreement Protocols Based on Self-certified Approach Tzong-Chen Wu and Yen-Ching Lin Department of Information Management National Taiwan University of Science and Technology, Taiwan

Outline  Introduction  Security attributes  The proposed PAKA protocols System model The proposed 2-PAKA protocol The proposed n-PAKA protocol  Conclusions

Introduction  Authenticated key agreement (AKA) protocols Allow communication parties to mutually authenticate with each other and share an authenticated session key Establish a secure channel for subsequent communications  Previous works for AKA protocols (based on Decision Diffie- Hellman problem): 2-AKA:Diffie, van Oorschost, Wiener (1992) Blake-Wilson, Menezes (1998) n-AKA:Just and Vaudenay (1996) Steiner, Tsudik, Waidner (1997) Ateniese, Steiner, Tsudik (1998, 2000) Bresson, Chevassut, Pointcheval (2001, 2002)

Introduction (cont.)  Use of passwords for authentication Advantages: ease of use, ease of implementation, and low cost Disadvantages: on-/off-line guessing attacks  Password-only authenticated key agreement ( PAKA) protocols Achieve the security attributes of AKA Only use easy-to-remember passwords, even for weak passwords (i.e., against on-/off-line guessing attacks)

Introduction (cont.)  Previous works for 2-PAKA protocols (based on Decision Diffie-Hellman problem) Bellovin and Merritt (1992, 1993) Jablon (1996) Lee, Shohn, Yang, Won (1999) Boyko, Mackenzie, Patae (200) Bellare, Pointcheval, Rogaway, (2000) Lin, Sun, Hwang (2000), Lin, Sun, Steiner, Hwang (2001) Mackenzie, Patel, Swaminathan (2000) ……  Previous works for n-PAKA protocols ???

Contributions of this paper  Propose a 2-PAKA protocol based on self-certified approach Communicating parties only use passwords, no more other secret parameters (e.g., long-term private keys) or trusted servers (adopted by three-party PAKA protocols) are required during the key agreement phase Messages sent between the communication parties are self-certified, and hence, no public key certificates are required while applying public key systems Achieve the security attributes of AKA Against on-/off-line guessing attacks  Generalize 2-PAKA to n-PAKA (based on CLIQUES proposed by Steiner, Tsudik, and Waidner, 1997)

Security attributes  Know-key security An attacker cannot derive any established session keys from any compromised session key  Perfect forward secrecy An attacker cannot derive any previously established session keys from a compromised password  On-/off-line guessing attacks An attacker cannot find out the parties’ passwords from the intercepted messages by exhaustive search

Security attributes (cont.)  Password-compromised impersonation attacks Suppose that the password PW i for party U i is compromised. However, it may be desirable in some circumstances that an attacker cannot impersonate the other parties U j to U i using the compromised PW i  Unknown key-share attacks An attacker intercepted U i ’s message and then replayed to U j. For the success of such attacks, U i ends up believing he shares a session key with U j, and although this is in fact the case, U j mistakenly believes the key is instead shared with some party U a ≠ U i

System model … 3. PAKA protocol 1.Register with password 2.SA returns a self-certified public value Party U 1 System Authority (SA) Party U 2 Party U n 3. PAKA protocol

System setup phase N: a composite of P and Q, where P and Q are two large primes R: a prime that can withstand exhaustive search attack g: a generator g modulo N with the order R f : a one-way function, where 0 < f(x) < R for any x At the end of this phase, SA publishes N and f, while keeping P, Q and R secret.

User registration phase UiUi SA 1.1 compute f(ID i, PW i ) -1, f(ID i ) -1 f(ID i, PW i ) ‧ f(ID i, PW i ) -1 = 1 modR f(ID i ) ‧ f(ID i ) -1 = 1 mod R 1.2 randomly choose an integer 1.3 compute 2.{c i, w i } 3.1 compute Pre_shared {ID i, PW i } 3.2 verify

Proposed 2-PAKA protocol U i U j 1.1 randomly choose two integers x i, t i 1.2 compute 2. {ID i, w i, y i, r i, s i } 3.1 verify 3.2 compute y j, r j and s j as that in Step compute 4. {ID j, w j, y j, r j, s j, m j } 5.1 verify y j, r j and s j as that in Step verify 5.2 compute 5.3 verify 5.4 compute 6. {ID i, m i }

Proposed n-PAKA protocol  The proposed n-PAKA protocol is somewhat like the CLIQUES (Steiner, Tsudik, Waidner, 1997)  Suppose that the registered parties U 1, U 2, …, U n want to perform the n-PAKA protocol. U 1 is the originator, and the communication priority is in the sequence of U 1, U 2, …, U n

Proposed n-PAKA protocol (cont.) UiUi U i+1 2. {ID i, Xi, wi, y i, r i, s i } 1.compute 3 verify

Proposed n-PAKA protocol (cont.) U n U i 5. broadcast { ID n, X n, w n, r n, s n, m n } 4.1compute X n, y n, r n and s n, as that in step 1, where 6.1 U i verify { ID n, X n, w n, y n, r n, s n, m n } as that step compute 6.2 compute 6.3 verify

Security analysis  Under the DLMC (discrete logarithm modulo composite) assumption, the proposed PAKA protocols achieve : known-key security perfect forward secrecy resistant of on-/off-line password guessing attacks resistant of password-compromised impersonation attacks resistant of unknown key-share attacks

Conclusions  A 2-PAKA protocol based on self-certified approach is proposed  An n-PAKA protocol, generalized from 2- PAKA is proposed  The security of proposed PAKA protocols is based on the intractability of DLMC problems

Thank You for Your Attention