0% Complete
فارسی
Home
/
پانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Cryptanalysis of two password authenticated key exchange schemes
Authors :
Mohammad Ali Poorafsahi
1
Hamid Mala
2
1- دانشگاه اصفهان
2- دانشگاه اصفهان
Keywords :
Authentication،EKE،Key Exchange،LWE،PAKE،assword guessing attack
Abstract :
In the realm of password authenticated key exchange (PAKE) protocols, security and efficiency are of greatest importance. This article examines two modern PAKE schemes: the RLWE-SRP, a quantum-safe variant of the Secure Remote Password (SRP) protocol, and the ID-PAKE-PFS, an identity-based Password Authentication and Key Establishment scheme. Our analysis reveals specific vulnerabilities in both protocols: RLWE-SRP is susceptible to Denial of Service (DoS) attacks due to the lack of initial message validation, while ID-PAKE-PFS is vulnerable to password guessing attacks due to the inclusion of identities in ciphertexts. To address these vulnerabilities, we propose modifications for each of them: (1) For RLWE-SRP, we introduce a hash-based validation step in the authentication phase to verify the authenticity of initial messages. (2) For ID-PAKE-PFS, we suggest slight modification in how ciphertexts are calculated to prevent attackers from verifying password guesses. These modifications effectively strengthen both protocols against their respective vulnerabilities while maintaining their core functionalities in both classical and post-quantum environments.
Papers List
List of archived papers
Embedded speech encoder for low-resource languages
Alireza A.Tabatabaei - Pouria Sameti - Ali Bohlooli
Experimental analysis of automated negotiation agents in modeling Gaussian bidders
Fatemeh Hassanvand - Dr Faria Nassiri-Mofakham
Designing an AI-assisted toolbox for fitness activity recognition based on deep CNN
Ali Bidaran - Dr Saeed Sharifian
Stock Market Prediction Using Hard and Soft Data Fusion
Saeed Mohammadi Dashtaki - Masoud Alizadeh - Behzad Moshiri
Improving Fog Computing Scalability in Software Defined Network using Critical Requests Prediction in IoT
Hajar Ghanbari
A Model-Driven Approach for Automatic Generation of Android Tourism Applications
Sara Adib - Bahman Zamani
ارائۀ چارچوب هستانشناسی برای شهر هوشمند مبتنی بر سیستمهای سایبر-فیزیکی
علی اصغر قائمی - جعفر حبیبی - سید حسن میریان
شبکههای نرمافزار محور در کلان داده: مطالعهی راهکارهای امنیتی و چالشها
احسان سلیمانی دهکردی - محمدرضا ملاخلیلی میبدی
Data Analysis to Reduce Electrical Power Plants
Amirali Sahraei - Jamshid Shanbehzadeh
Targeted Vaccination for COVID-19 Using Mobile Communication Networks
Mohammadmohsen Jadidi - Pegah Moslemi - Saeed Jamshidiha - Iman Masroori - Abbas Mohammadi - Vahid Pourahmadi
more
Samin Hamayesh - Version 42.0.3