Probe of Password Authenticated 3P-EKE Protocols
Keywords:
Password authentication, Encrypted Key Exchange (EKE), Three Party-EKE Protocols, Detectable On-line Dictionary Attacks, Undetectable On-line Dictionary AttacksAbstract
To establish a secure communication over unreliable networks, Password-Authenticated Encrypted Key Exchange (PA-EKE) protocols plays a pivotal role. Diffie & Hellman (D-H) (1976) proposed a first key agreement protocol, which is suffered from man-in-the-middle attack. To overcome a flaw, many authors proposed password-authenticated key agreement protocols. Chang & Chang (2004) proposed a novel password-authenticated 3P-EKE protocol with round efficiency. In contrast, Yoon & Yoo (2008) notified an undetectable online dictionary attack on this protocol and proposed an improvement over it. Later, Padmavathy et al. cryptanalyzed the Yoon-Yoo’s protocol and proposed PSRJ Protocol. Subsequently, Archana et al. (2012) notified a detectable online dictionary attack on PSRJ Protocol. Afterward, an improvement over the Yoon-Yoo’s protocol is proposed by Raj et al. (2013), which is cryptanalyzed by Archana et al. (2013). In this paper we have analyzed all the above protocols at their performance level.
References
Chin-Chen Chang*, Ya-fen Chang, “A novel three-party encrypted key exchange protocol”, Elsevier, Computer Standards & Interfaces, Volume-26, Issue/No-5, Page No (471 – 476), 2004.
Y. Ding and P. Horster, “Undetectable on-line password guessing attacks,” ACM Operating Systems Review, Volume-9, Issue/No-4, Page no (77-86), 1995.
W. Diffie and M. E. Hellman. “New directions in cryptography”. IEEE Transactions on Information Theory, Volume-22, Issue/No-6, Page No (644– 654), 1976.
S.M. Bellovin and M. Merritt, “Encrypted key exchange: password-based protocols secure against password guessing attacks,” in Proc. of 1992 IEEE Symposium on Research in Security and Privacy, Page No (72–84), 1992.
M. Steiner, G. Tsudik, and M. Waidner, “Refinement and extension of encrypted key exchange”, ACM Operating Systems Review, Volume-29, Issue/No-5, Page No (22-30), 1995.
C. L. Lin, H. M. Sun, and T. Hwang, “Three party encrypted key exchange: attacks and a solution”, ACM Operating Systems Review, Volume -34, Issue/No-4, Page No (12-20), 2002.
Feng Zhu, Duncan S. Wong, Agnes H. Chan, Robbie Ye ”Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks” Information Security, Lecture Motes in Computer Science, Volume -2433, Page No (150-161), 2002.
Yeh H-T, Sun H-M, Hwang T, “Efficient three-party authentication and key agreement protocols resistant to password guessing attacks”, Journal of Information Science and Engineering, Volume-19, Issue/No-6, Page No (1059-1070), 2003.
T. f. Lee, T. Hwang, and C. L. Lin, “Enhanced three party encrypted key exchange without server public Keys”. Computers and Security, Volume-23, Issue/No-7, Page No (571-577), 2004.
Eun-Jun Yoon, Kee-Young Yoo, “Improving the novel three-party encrypted key exchange protocol”, Elsevier, Computer Standards and Interfaces, Volume-30, Issue/No-5, Page No (309-314) , 2008.
R.Padmavathy , Tallapally Shirisha , M.Rajkumar , JayadevGyani, “Improved analysis on Chang and Chang Password Key Exchange Protocol”, IEEE International Conference on Advances in Computing, Control, and Telecommunication Technologies, Page No (781-783), 2009.
Archana Raghuvamshi, P.Venkateshwara Rao,and Prof.P.Premchand , “Cryptanalysis of Authenticated Key Exchange 3P-EKE Protocol and its Enhancement”, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012), Page No (659-666), March 30-31, 2012.
P.Rajkumar, C.Manoharan, M.Ananthi, “Performance Analysis Of 3pek Exchange Protocol Using Parallel Message Transmission Technique”, International Journal of Engineering Research & Technology (IJERT), Volume-1, Issue/No-7, Page No (1-5) Sep 2012.
Archana Raghuvamshi , Prof.P.Premchand ,“A Weakness in 3pek Exchange Protocol using Parallel Message Transmission Technique”, International Journal of Advanced Research in Computer Science(IJARCS), Volume-4, Issue/No-11, Page No (104-108), Dec 2013
Y. Gertner, T. Malkin, O. Reingold, “On the impossibility of basing trapdoor functions on trapdoor predicates”, Proceedings of the 42nd IEEE Symposium on foundations of Computer Science, Las Vegas, Mevada, Page No (126 – 135), Oct 2001.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
