0% Complete
English
صفحه اصلی
/
پانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Cryptanalysis of two password authenticated key exchange schemes
نویسندگان :
Mohammad Ali Poorafsahi
1
Hamid Mala
2
1- دانشگاه اصفهان
2- دانشگاه اصفهان
کلمات کلیدی :
Authentication،EKE،Key Exchange،LWE،PAKE،assword guessing attack
چکیده :
In the realm of password authenticated key exchange (PAKE) protocols, security and efficiency are of greatest importance. This article examines two modern PAKE schemes: the RLWE-SRP, a quantum-safe variant of the Secure Remote Password (SRP) protocol, and the ID-PAKE-PFS, an identity-based Password Authentication and Key Establishment scheme. Our analysis reveals specific vulnerabilities in both protocols: RLWE-SRP is susceptible to Denial of Service (DoS) attacks due to the lack of initial message validation, while ID-PAKE-PFS is vulnerable to password guessing attacks due to the inclusion of identities in ciphertexts. To address these vulnerabilities, we propose modifications for each of them: (1) For RLWE-SRP, we introduce a hash-based validation step in the authentication phase to verify the authenticity of initial messages. (2) For ID-PAKE-PFS, we suggest slight modification in how ciphertexts are calculated to prevent attackers from verifying password guesses. These modifications effectively strengthen both protocols against their respective vulnerabilities while maintaining their core functionalities in both classical and post-quantum environments.
لیست مقالات
لیست مقالات بایگانی شده
استفاده از هوش مصنوعی در فضای آموزش عالی: آن روی سکه
محمدمتین لیث صفار - عسل آغاز
Extending Interaction Flow Modeling Language as a Profile for Form-making Systems
Ghazaleh Shahin - Dr Bahman Zamani
A Novel Decentralized Privacy Preserving Federated Learning Model for Healthcare Applications
Saba Ameri - Reza Ebrahimi Atani
Vehicle to Vehicle Distance Estimation Utilizing Visible Light Communication and Machine Learning
Armita Khari - Houman Zarrabi
توسعه مدل مفهومی طراحی فرآیند مدیریت بحران سیلاب از طریق بهینه سازی استفاده از دستگاه های اینترنت اشیاء (IoT Devices) در تصمیم گیری
محمود رسولی - سید احسان ملیحی
Experimental analysis of automated negotiation agents in modeling Gaussian bidders
Fatemeh Hassanvand - Dr Faria Nassiri-Mofakham
AI-Driven Approach to Detect Equivalent Elements within Domain Models
Mohammad-Sajad Kasaei - Mohammadreza Sharbaf - Afsaneh Fatemi - Bahman Zamani
Fast Online Character Recognition Using a Novel Local-Global Feature Extraction Method
Ayoub Parvizi - Dr Mohammad Kazemifard - Ziba Imani
GanjNet: Leveraging Network Modeling with Large Language Models for Persian Word Sense Induction
Amir Mohammad Kouyeshpour - Hadi Veisi - Saman Haratizadeh
تشخیص زودهنگام سندروم داون از روی تصاویر سونوگرافی جنین با استفاده از مدلهای عمیق پیشآموزش دیده
فائزه سادات حسینی نیا - محرم منصوری زاده - حسن ختنلو
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.5.2