Cryptanalysis of an efficient three-party password-based key exchange scheme

  • Authors:
  • Marcos A. Simplicio, Jr.;Rony R.M. Sakuragui

  • Affiliations:
  • Escola Politécnica—University of São Paulo, São Paulo, Brazil;Escola Politécnica—University of São Paulo, São Paulo, Brazil

  • Venue:
  • International Journal of Communication Systems
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Three-party password-authenticated key exchange (3PAKE) protocols allow entities to negotiate a secret session key with the aid of a trusted server with whom they share a human-memorable password. Recently, Lou and Huang proposed a simple 3PAKE protocol based on elliptic curve cryptography, which is claimed to be secure and to provide superior efficiency when compared with similar-purpose solutions. In this paper, however, we show that the solution is vulnerable to key-compromise impersonation and offline password guessing attacks from system insiders or outsiders, which indicates that the empirical approach used to evaluate the scheme's security is flawed. These results highlight the need of employing provable security approaches when designing and analyzing PAKE schemes. Copyright © 2011 John Wiley & Sons, Ltd.