An off-line dictionary attack on a simple three-party key exchange protocol

  • Authors:
  • Junghyun Nam;Juryon Paik;Hyun-Kyu Kang;Ung Mo Kim;Dongho Won

  • Affiliations:
  • Department of Computer Science, Konkuk University, Chungju-si, Chungcheongbuk-do, Korea;Department of Computer Engineering, Sungkyunkwan University, Suwon-si, Gyeonggi-do, Korea;Department of Computer Science, Konkuk University, Chungju-si, Chungcheongbuk-do, Korea;Department of Computer Engineering, Sungkyunkwan University, Suwon-si, Gyeonggi-do, Korea;Department of Computer Engineering, Sungkyunkwan University, Suwon-si, Gyeonggi-do, Korea

  • Venue:
  • IEEE Communications Letters
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Key exchange protocols allow two or more parties communicating over a public network to establish a common secret key called a session key. Due to their significance in building a secure communication channel, a number of key exchange protocols have been suggested over the years for a variety of settings. Among these is the so-called S-3PAKE protocol proposed by Lu and Cao for password-authenticated key exchange in the three-party setting. In the current work, we are concerned with the password security of the S-3PAKE protocol. We first show that S-3PAKE is vulnerable to an off-line dictionary attack in which an attacker exhaustively enumerates all possible passwords in an off-line manner to determine the correct one. We then figure out how to eliminate the security vulnerability of S-3PAKE.