0% Complete
English
صفحه اصلی
/
پانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Cryptanalysis of two password authenticated key exchange schemes
نویسندگان :
Mohammad Ali Poorafsahi
1
Hamid Mala
2
1- دانشگاه اصفهان
2- دانشگاه اصفهان
کلمات کلیدی :
Authentication،EKE،Key Exchange،LWE،PAKE،assword guessing attack
چکیده :
In the realm of password authenticated key exchange (PAKE) protocols, security and efficiency are of greatest importance. This article examines two modern PAKE schemes: the RLWE-SRP, a quantum-safe variant of the Secure Remote Password (SRP) protocol, and the ID-PAKE-PFS, an identity-based Password Authentication and Key Establishment scheme. Our analysis reveals specific vulnerabilities in both protocols: RLWE-SRP is susceptible to Denial of Service (DoS) attacks due to the lack of initial message validation, while ID-PAKE-PFS is vulnerable to password guessing attacks due to the inclusion of identities in ciphertexts. To address these vulnerabilities, we propose modifications for each of them: (1) For RLWE-SRP, we introduce a hash-based validation step in the authentication phase to verify the authenticity of initial messages. (2) For ID-PAKE-PFS, we suggest slight modification in how ciphertexts are calculated to prevent attackers from verifying password guesses. These modifications effectively strengthen both protocols against their respective vulnerabilities while maintaining their core functionalities in both classical and post-quantum environments.
لیست مقالات
لیست مقالات بایگانی شده
Sigma: A Secure Federated Network Gaming Platform
Keyhan Mohammadi - Reza Ebrahimi Atani
Distributed coordination protocol for event data exchange in IoT monitoring applications
Behnam Khazael - Hadi Tabatabaee Malazi
AN EFFICIENT TASK SCHEDULING IN CLOUD COMPUTING BASED ON ACO ALGORITHM
Zahra Shafahi - Dr Alireza Yari
کشف لبه در تصاویر پزشکی با استفاده از اتوماتای سلولی سلسله مراتبی
مریم علینقی زاده - علیرضا رضوانیان
Open-domain question classification and completion in conversational information search
Omid Mohammadi Kia - Mahmood Neshati - Mahsa Soudi Alamdari
طبقه بندی روش های شناسایی داده های تکراری در جهت تسهیل فرایند پاکسازی داده ها
مهدی جعفری - احمد عبدالله زاده بار فروش
Paths-oriented Test Data Generation using Genetic Algorithm
Mohammad Reza Hassanpour Charmchi - Dr Bagher Rahimpour cami
Binary water stream algorithm: a new meta-heuristic optimization technique
Faezeh Rahimi Sebdani - Mehdi Nasri
Movable Antenna Design for UAV-Aided Federated Learning via Deep Reinforcement Learning
MOHSEN Ahmadzadeh - Saeid Pakravan - Ghosheh Abed Hodtani
The risk prediction of heart disease by using neuro-fuzzy and improved GOA
Vahid Safari Dehnavi - Masoud Shafiee
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.0.3