Download presentation
Presentation is loading. Please wait.
Published byDerek Terry Modified over 8 years ago
1
RSA-based password authenticated key exchange protocol Presenter: Jung-wen Lo( 駱榮問 )
2
2 Outline Introduction C.C. Yang, R.C. Wang, "Cryptanalysis of improvement of password authenticated key exchange based on RSA for imbalanced wireless networks," IEICE Transactions on Communications, Vol. E88-B, No. 11, pp. 4370-4372, 2005. Chien-Lung Hsu, Wen-Te Lin, and Yen-Chun Chou, “New Efficient Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks”, Journal of Computers, Vol.18, No.2, pp. 25-32, 2007 Conclusion & Comment
3
3 Introduction Password-authenticated key exchange (PAKE) protocol Two communicating parties share a session key over an insecure channel 1992: 1st PAKE protocol proposed by Bellovin and Merrit 2002 Zhu et al.: e-residues attack in BM 2003 Yeh et al.: impersonation attack in Zhu 2005 Yang-Wang.: dictionary/man-in-the-middle attack in Yeh 2007 Hsu et al.: performance improvement Two classes Use Diffie–Hellman key exchange Use RSA cryptosystem RSA-PAKE protocol RSA parameter generation/verification phase challenge/response qualified parameter which satisfies several conditions Session key establishment phase
4
Cryptanalysis of improvement of password authenticated key exchange based on RSA for imbalanced wireless networks Authors: C.C. Yang and R.C. Wang, Src: IEICE Transactions on Communications, Vol. E88-B, No. 11, pp. 4370-4372, 2005.
5
5 Yeh et al.’s Protocol (n, e), r A z σ δ Server A r A R {0,1} l π= z d mod n (ID A,ID B,r A,r B )=D pw (π) c B =h 2 (r B ) K=h 3 (r A,c B,ID A,ID B ) σ=E K (ID B ) δ’ =h 4 (K) δ ’ ?= δ Client B r B R Z n π=E pw (ID A,ID B,r A,r B ) z =π e mod n c’ B =h 2 (r B ) K’=h 3 (r A,c’ B,ID A,ID B ) ID B’ =D K’ (σ) ID B’ ?= ID B δ = h 4 (K’) {m i R Z n } 1 i N {m i e R Z n } 1 i N {h 1 (m i ’)} 1 i N Request h 1 (m’ i ) ?= h 1 (m i )
6
6 Weakness of Yeh et al.’s scheme Can not against dictionary attack (n’, e’), r F z {m i e’ R Z n } 1 i N {h 1 (m i ’)} 1 i N Server A rFrF z d’ => π D pw’ (π)?=(ID A,ID B,r A,r B ) Attacker F (n’,d’,e’) Client B r B π=E pw (ID A,ID B,r A,r B ) z =π e’ mod n’ {m i R Z n } 1 i N Request
7
7 Yang-Wang’s Improved Protocol ω z σ δ Server A r A R {0,1} l ω =(e||n||r A ) h 1 (pw) π= z d mod n (ID A,ID B,r A,r B )=D pw (π) c B =h 2 (r B ) K=h 3 (r A,c B,ID A,ID B ) σ=E K (ID B ) δ’ =h 4 (K) δ ’ ?= δ Client B r B R Z n π=E pw (ID A,ID B,r A,r B ) z =π e mod n c’ B =h 2 (r B ) K’=h 3 (r A,c’ B,ID A,ID B ) ID B’ =D K’ (σ) ID B’ ?= ID B δ = h 4 (K’) {m i R Z n } 1 i N C i =(m i ||r A ) e mod n {c i } 1 i N {h 1 (m i ’)} 1 i N Request h 1 (m’ i ) ?= h 1 (m i ) e||n||r A = ω h 1 (pw) m’ i ||r A =c i d mod n
8
New Efficient Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks Authors: Chien-Lung Hsu, Wen-Te Lin, and Yen-Chun Chou Src: Journal of Computers, Vol.18,No.2, pp. 25-32, 2007
9
9 Hsu et al. ’ s Improved Protocol ω σ, z δ Server A r A R {0,1} l ω =E pw (r A ||n||e) r’ B = (z d mod n) pw r A K’=r A r’ B (ID A ||ID B ) σ ?= h(r A ||r’ B ||ID A ||ID B ||K’) δ =h(K’) Client B r B R Z n z =(r B pw r A ) e mod n K= r A r B (ID A ||ID B ) σ= h(r A ||r B ||ID A ||ID B ||K) δ ? = h(K) {m i R Z n } 1 i N {h(m i ’)} 1 i N Request h (m’ i ) ?= h(m i ) r A ||e||n=E pw ( ω) {m i e R Z n } 1 i N
10
10 Comparison-1
11
11 Comparison-2 |ε|:ciphertext |n|: modular n |h|: hash fct
12
12 Conclusion & Comment Conclusion Less cost Computational complexities Communication overheads Transmission number Better security Comment Error of Table 3 Performance improvement 22 2 2 2 2 1 2 4 4 4 3
13
13 P187 Protocol (Improved) ID A, n, e, ω, H(ID A,n,e,ω) {m i e mod n} 1 i N {H (m i )} 1 i N z Server A (pw) r’ A ||r’ B =z d r’ A ?=r A σ =H(r A,r’ B,ID A,ID B ) δ=H(σ ⊕ r’ B ) n,e,d,r A ω=r A ⊕ H(pw) Client B (pw) {m i } 1 i N r’ A = ω ⊕ H(pw) r B z=(r’ A ||r B ) e mod n σ =H(r A,r B,ID A,ID B ) δ?=H(σ ⊕ r B ) δ Request
14
14 Comparison New (N+4)T h +(N+1)T exp +2T XOR (N+4)T h +(N+1)T exp +2T XOR ※ 1T E ≒ 10T h 4T XOR
15
15 Bellovin-Merritt’s Interactive RSA-EKE Protocol 1. ID A, n, e 2. {m i e mod n} 1 i N 3. {m i mod n} 1 i N 4. E pw (σ, r B ) 5.E σ (r B,r A ) 6.E σ (r A ) Server A (pw) Client B (pw) rArA {m i } 1 i N σ,r B n,e,d
16
16 Zhu et al’s Protocol (2002) Server A (pw) Client B (pw) (n, e), r A 2’.r B, s B π=T(pw, ID A,ID B,r A,r B ) z =s B e +π z, r B E k (c A,ID B ) 4.D k (E k (c A,ID B )) => c’ A check ID B ? σ’=G 3 (c’ A,c B,ID A,ID B ) h(σ’) 2. {m i R Z n } 1 i N {m i e R Z n } 1 i N {H(m i ’)} 1 i N 1. r A 3. π=T(pw, ID A,ID B,r A,r B ) Decrypt (z-π) => s B k =G 1 (s B ) c A 5. h(σ’) ?= h(σ) 4’. c B =G 2 (s B ) σ=G 3 (c A,c B,ID A,ID B )
17
17 Cryptanalysis Zhu et al’s Protocol Attacker E (pw’) (n, e), r A 2’.r E, s E π’=T(pw’, ID A,ID B,r A,r E ) z’ =s E e +π’ z’, r E E k (c A,ID B ) 4. k’ =G 1 (s E ) D k’ (E k (c A,ID B )) => If ID B correct ==> pw’=pw 2. Intercept (n, e), r A Interactive check (n,e) Client B (pw) {m i e R Z n } 1 i N {H(m i ’)} 1 i N Server A (pw) 1. r A 3. π=T(pw, ID A,ID B,r A,r E ) Decrypt (z’-π) => s’ E k =G 1 (s’ E ) c A
18
18 Yeh et al’s scheme : Man-in-the-middle attack Server A (pw) Client B (pw) 1. r A (n, e), r A 2’. s B π= E pw ( ID A,ID B,r A,s B ) z =π e’ mod n’ z’ 3. Decrypt z’ π s B D pw ( π )=s B c B =G 1 (s B ) σ=G 2 (r A,c B,ID A,ID B ) E σ (ID B ) 2. {m i R Z n } 1 i N {m i e R Z n } 1 i N {H(m i ’)} 1 i N Attacker C (n’,e’) (n’, e’), r A z {m i e’ R Z n } 1 i N {H(m i ’)} 1 i N z π z’ =π e mod n Try all pw’ D pw’ ( π ) s’ B G 1 (s’ B )=c’ B σ’=G 2 (r A,c’ B,ID A,ID B ) check D σ’ (E σ (ID B )) ?= ID B
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.