Skip to main content

An Authenticated Key Agreement Protocol Resistant to a Dictionary Attack

  • Conference paper
Computational Science and Its Applications – ICCSA 2004 (ICCSA 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3046))

Included in the following conference series:

Abstract

Recently, Lee-Lee pointed out that Hsu et al.’s key agreement scheme suffers from a modification attack and described an enhancement on it. Both of Lee-Lee’s enhancement and Hsu et al. scheme can be considered as variants of Diffie-Hellman scheme with user authentication that are based on a shared-password for providing authentication. This paper shows both schemes cannot withstand to a dictionary attack. Such an attack illustrates that extreme care must be taken when passwords are combined to provide user authentication in cryptographic protocols. This paper also presents a new authenticated key agreement protocol that is not secure to the dictionary attack but also has many desirable security properties, including forward secrecy and known-key secrecy. It is also able to withstand to both passive and active attacks. The security of the proposed scheme is based on the well-known cryptographic assumptions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blake-Wilson, S., Menezes, A.: Authenticated Diffie-Hellman key agreement protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 339–361. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  2. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transaction on Information Theory IT-22, 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  3. Seo, D.H., Sweeney, P.: Simple authenticated key agreement algorithm. Electronics Letters 35, 1073–1074 (1999)

    Article  Google Scholar 

  4. Tseng, Y.M.: Weakness in simple authenticated key agreement protocol. Electronics Letters 36, 48–49 (2000)

    Article  MathSciNet  Google Scholar 

  5. Lin, I.C., Chang, C.C., Hwang, M.S.: Security enhancement for the simple authentication key agreement algorithm. In: Computer Software and Applications Conference( COMPSAC), pp. 113–115 (2000)

    Google Scholar 

  6. Ku, W.C., Wang, S.D.: Cryptanalysis of modified authenticated key agreement protocol. Electronics Letters 36, 1770–1771 (2000)

    Article  Google Scholar 

  7. Hsu, C.L., Wu, T.S., Wu, T.C., Mitchell, C.: Improvement of modified authenticated key agreement protocol. Applied Mathematics and Computation 142, 305–308 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  8. Lee, N.Y., Lee, M.F.: Further improvement on the modified authenticated key agreement scheme. Applied Mathematics and Computation, Available online (November 2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ryu, EK., Kim, KW., Yoo, KY. (2004). An Authenticated Key Agreement Protocol Resistant to a Dictionary Attack. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3046. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24768-5_64

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24768-5_64

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22060-2

  • Online ISBN: 978-3-540-24768-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics