Efficient three-party key exchange protocols with round efficiency

Research output: Contribution to journalArticlepeer-review

15 Scopus citations

Abstract

Recently, Guo et al. discovered some security flaws of the simple three-party key exchange protocol proposed by Lu and Cao, and proposed an improved protocol. Independently, Chung and Ku also showed some weaknesses of Lu and Cao's protocol, and provided an improved protocol. In this paper, we review some insecurity of Lu and Cao's protocol and analyze two improved protocols proposed by Guo et al. and Chung and Ku. Then we show that the protocols are still insecure. They are vulnerable to an adversary who performs an off-line password guessing attack. We provide a countermeasure by performing detailed analysis on the security flaws in two improved protocols. We also propose a secure three-party password-authenticated key exchange protocol which requires three rounds.

Original languageEnglish
Pages (from-to)1367-1376
Number of pages10
JournalTelecommunication Systems
Volume52
Issue number2
DOIs
StatePublished - Feb 2013

Keywords

  • Cryptanalysis
  • Key exchange
  • Password
  • Password guessing attack
  • Three-party setting

Fingerprint

Dive into the research topics of 'Efficient three-party key exchange protocols with round efficiency'. Together they form a unique fingerprint.

Cite this