Abstract
Recently, Lee-Lee pointed out that Hsu et al.’s key agreement scheme suffers from a modification attack and described an enhancement on it. Both of Lee-Lee’s enhancement and Hsu et al. scheme can be considered as variants of Diffie-Hellman scheme with user authentication that are based on a shared-password for providing authentication. This paper shows both schemes cannot withstand to a dictionary attack. Such an attack illustrates that extreme care must be taken when passwords are combined to provide user authentication in cryptographic protocols. This paper also presents a new authenticated key agreement protocol that is not secure to the dictionary attack but also has many desirable security properties, including forward secrecy and known-key secrecy. It is also able to withstand to both passive and active attacks. The security of the proposed scheme is based on the well-known cryptographic assumptions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Blake-Wilson, S., Menezes, A.: Authenticated Diffie-Hellman key agreement protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 339–361. Springer, Heidelberg (1999)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transaction on Information Theory IT-22, 644–654 (1976)
Seo, D.H., Sweeney, P.: Simple authenticated key agreement algorithm. Electronics Letters 35, 1073–1074 (1999)
Tseng, Y.M.: Weakness in simple authenticated key agreement protocol. Electronics Letters 36, 48–49 (2000)
Lin, I.C., Chang, C.C., Hwang, M.S.: Security enhancement for the simple authentication key agreement algorithm. In: Computer Software and Applications Conference( COMPSAC), pp. 113–115 (2000)
Ku, W.C., Wang, S.D.: Cryptanalysis of modified authenticated key agreement protocol. Electronics Letters 36, 1770–1771 (2000)
Hsu, C.L., Wu, T.S., Wu, T.C., Mitchell, C.: Improvement of modified authenticated key agreement protocol. Applied Mathematics and Computation 142, 305–308 (2003)
Lee, N.Y., Lee, M.F.: Further improvement on the modified authenticated key agreement scheme. Applied Mathematics and Computation, Available online (November 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ryu, EK., Kim, KW., Yoo, KY. (2004). An Authenticated Key Agreement Protocol Resistant to a Dictionary Attack. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3046. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24768-5_64
Download citation
DOI: https://doi.org/10.1007/978-3-540-24768-5_64
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22060-2
Online ISBN: 978-3-540-24768-5
eBook Packages: Springer Book Archive