Password-based Authenticated Key Agreement Protocol Secure Against Advanced Modification Attack 


Vol. 11,  No. 3, pp. 277-286, Jun.  2004
10.3745/KIPSTC.2004.11.3.277


PDF
  Abstract

Password-based mechanism is widely used methods for user authentication. Password-based mechanisms are using memorable passwords(weak secrets), therefore password-based mechanisms are vulnerable to the password guessing attack. To overcome this problem, many password-based authenticated key exchange protocols have been proposed to resist password guessing attacks. Recently, Seo-Sweeny proposed password-based Simple Authenticated Key Agreement(SAKA) protocol. In this paper, first, we will examine the SAKA and authenticated key agreement protocols, and then we will show that the proposed simple authenticated key agreement protocols are still insecure against Advanced Modification Attack. And we propose a Password-based Simple Authenticated Key Agreement Protocol secure against Advanced Modification Attack.

  Statistics


  Cite this article

[IEEE Style]

J. Kwak, S. H. Oh, H. K. Yang, D. H. Won, "Password-based Authenticated Key Agreement Protocol Secure Against Advanced Modification Attack," The KIPS Transactions:PartC, vol. 11, no. 3, pp. 277-286, 2004. DOI: 10.3745/KIPSTC.2004.11.3.277.

[ACM Style]

Jin Kwak, Soo Hyun Oh, Hyung Kyu Yang, and Dong Ho Won. 2004. Password-based Authenticated Key Agreement Protocol Secure Against Advanced Modification Attack. The KIPS Transactions:PartC, 11, 3, (2004), 277-286. DOI: 10.3745/KIPSTC.2004.11.3.277.