140 likes | 246 Views
RSA-based password authenticated key exchange protocol. Presenter: Jung-wen Lo( 駱榮問 ). Outline. Introduction
E N D
RSA-based password authenticated key exchange protocol Presenter: Jung-wen Lo(駱榮問)
Outline • Introduction • C.C. Yang, R.C. Wang, "Cryptanalysis of improvement of password authenticated key exchange based on RSA for imbalanced wireless networks," IEICE Transactions on Communications, Vol. E88-B, No. 11, pp. 4370-4372, 2005. • Chien-Lung Hsu, Wen-Te Lin, and Yen-Chun Chou, “New Efficient Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks”, Journal of Computers, Vol.18, No.2, pp. 25-32, 2007 • Conclusion & Comment
Introduction • Password-authenticated key exchange (PAKE) protocol • Two communicating parties share a session key over an insecure channel • 1992: 1st PAKE protocol proposed by Bellovin and Merrit • 2002 Zhu et al.: e-residues attack in BM • 2003 Yeh et al.: impersonation attack in Zhu • 2005 Yang-Wang.: dictionary/man-in-the-middle attack in Yeh • 2007 Hsu et al.: performance improvement • Two classes • Use Diffie–Hellman key exchange • Use RSA cryptosystem • RSA-PAKE protocol • RSA parameter generation/verification phase • challenge/response • qualified parameter which satisfies several conditions • Session key establishment phase
Cryptanalysis of improvement of password authenticated key exchange based on RSA for imbalanced wireless networks Authors: C.C. Yang and R.C. Wang, Src: IEICE Transactions on Communications, Vol. E88-B, No. 11, pp. 4370-4372, 2005.
Yeh et al.’s Protocol Server A Client B Request rAR{0,1}l (n, e), rA {miR Zn}1iN {mieR Zn}1iN {h1(mi’)}1iN h1(m’i) ?= h1(mi) rBRZnπ=Epw(IDA,IDB,rA,rB)z =πe mod n π= zd mod n(IDA,IDB,rA,rB)=Dpw(π) cB=h2(rB)K=h3(rA,cB,IDA,IDB)σ=EK(IDB) z σ c’B=h2(rB)K’=h3(rA,c’B,IDA,IDB)IDB’=DK’(σ)IDB’ ?= IDBδ= h4(K’) δ δ’=h4(K)δ’ ?= δ
Weakness of Yeh et al.’s scheme • Can not against dictionary attack Server A Client B Request Attacker F(n’,d’,e’) (n’, e’), rF rF {miR Zn}1iN {mie’R Zn}1iN {h1(mi’)}1iN rBπ=Epw(IDA,IDB,rA,rB) z =πe’ mod n’ z zd’ => π Dpw’(π)?=(IDA,IDB,rA,rB)
Yang-Wang’s Improved Protocol Server A Client B e||n||rA=ωh1(pw) Request rAR{0,1}lω=(e||n||rA)h1(pw) ω {miR Zn}1iNCi=(mi||rA)e mod n {ci}1iN m’i||rA=cidmod n {h1(mi’)}1iN h1(m’i) ?= h1(mi) rBRZnπ=Epw(IDA,IDB,rA,rB)z =πe mod n z π= zd mod n(IDA,IDB,rA,rB)=Dpw(π) cB=h2(rB)K=h3(rA,cB,IDA,IDB)σ=EK(IDB) σ c’B=h2(rB)K’=h3(rA,c’B,IDA,IDB)IDB’=DK’(σ)IDB’ ?= IDBδ= h4(K’) δ δ’=h4(K)δ’ ?= δ
New Efficient Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks Authors: Chien-Lung Hsu, Wen-Te Lin, and Yen-Chun Chou Src: Journal of Computers, Vol.18,No.2, pp. 25-32, 2007
Hsu et al.’s Improved Protocol Server A Client B rA||e||n=Epw(ω) Request rAR{0,1}lω=Epw(rA||n||e) ω {miR Zn}1iN {mieR Zn}1iN {h(mi’)}1iN h(m’i) ?= h(mi) rBRZnz =(rBpw rA)e mod nK= rArB(IDA||IDB)σ=h(rA||rB||IDA||IDB||K) r’B= (zd mod n)pw rAK’=rA r’B (IDA||IDB)σ ?= h(rA||r’B||IDA||IDB||K’) σ, z δ δ ?= h(K) δ=h(K’)
Comparison-2 |ε|:ciphertext |n|: modular n |h|: hash fct
2 2 4 4 2 2 2 4 2 1 3 2 Conclusion & Comment • Conclusion • Less cost • Computational complexities • Communication overheads • Transmission number • Better security • Comment • Error of Table 3 • Performance improvement
P187 Protocol (Improved) Request Client B(pw) Server A(pw) IDA, n, e, ω, H(IDA,n,e,ω) n,e,d,rAω=rA⊕H(pw) {mie mod n} 1iN {mi}1iN {H (mi )}1iN r’A= ω⊕H(pw) rBz=(r’A||rB)e mod nσ =H(rA,rB,IDA,IDB) δ?=H(σ ⊕rB) z r’A||r’B=zdr’A?=rAσ =H(rA,r’B,IDA,IDB) δ=H(σ ⊕r’B) δ
Comparison New (N+4)Th+(N+1)Texp+2TXOR (N+4)Th+(N+1)Texp+2TXOR 4TXOR 4TXOR ※ 1TE ≒ 10Th