0% Complete
فارسی
Home
/
پانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Cryptanalysis of two password authenticated key exchange schemes
Authors :
Mohammad Ali Poorafsahi
1
Hamid Mala
2
1- دانشگاه اصفهان
2- دانشگاه اصفهان
Keywords :
Authentication،EKE،Key Exchange،LWE،PAKE،assword guessing attack
Abstract :
In the realm of password authenticated key exchange (PAKE) protocols, security and efficiency are of greatest importance. This article examines two modern PAKE schemes: the RLWE-SRP, a quantum-safe variant of the Secure Remote Password (SRP) protocol, and the ID-PAKE-PFS, an identity-based Password Authentication and Key Establishment scheme. Our analysis reveals specific vulnerabilities in both protocols: RLWE-SRP is susceptible to Denial of Service (DoS) attacks due to the lack of initial message validation, while ID-PAKE-PFS is vulnerable to password guessing attacks due to the inclusion of identities in ciphertexts. To address these vulnerabilities, we propose modifications for each of them: (1) For RLWE-SRP, we introduce a hash-based validation step in the authentication phase to verify the authenticity of initial messages. (2) For ID-PAKE-PFS, we suggest slight modification in how ciphertexts are calculated to prevent attackers from verifying password guesses. These modifications effectively strengthen both protocols against their respective vulnerabilities while maintaining their core functionalities in both classical and post-quantum environments.
Papers List
List of archived papers
DynamicEvoStream : خوشه بندی پویای جریان داده تکاملی در زمانهای بیکاری
زهرا عمیقی - مرتضی یوسف صنعتی - میرحسین دزفولیان
A Novel Resource Allocation Scheme for Underlaying NOMA-Based Multi-Channel Cognitive D2D Communications
Anahita Akbari - Dr Javad Zeraatkar Moghaddam - Dr Mehrdad Ardebilipour
Optimal control of robotic hand for rehabilitation using fractional order systems and EEG signal processing
Mehran Safari Dehnavi - Vahid Safari Dehnavi - Masoud Shafiee
BMPA- DSL: Binary Marine Predators Algorithm to Identify Driver's Different Levels of Stress
Mahtab Vaezi - Mehdi Nasri - Farhad Azimifar - Mahdi Mosleh
Energy–Aware Clustering Routing Protocol to Improve the Multi-hop WSN Lifetime
Alireza Gholamrezaee - Hoda Gholamrezaee - Mahtab Hadiyan
Data Analysis to Reduce Electrical Power Plants
Amirali Sahraei - Jamshid Shanbehzadeh
Epileptic Seizure Detection based on Statistical and Wavelet Features and Siamese Network
Zahra Hossein-Nejad - Mehdi Nasri
Fast Duplicate Bug Reports Detector Training using Sampling for Dimension Reduction
Behzad Soleimani Neysiani - Saeed Doostali - Seyed Morteza Babamir - Zahra Aminoroaya
Enhancing Supervised Learning in Speech Emotion Recognition through Unsupervised Representations
Niloufar Faridani - Amirali Soltani Tehrani - Ramin Toosi
A Topic Based Method to Classify the Question Clarity in CQA Networks
Alireza Khabbazan - Dr Ahmad Ali Abin
more
Samin Hamayesh - Version 42.3.1