This paper presents a new password authentication and key-exchange protocol suitable for three-party without a server public key and exchanging keys over an untrusted network. The new protocol resists dictionary attacks mounted by either passive or active network intruders, allowing, in principle, even weak password phrases to be used safely. It also offers perfect forward secrecy, which protects past sessions and passwords against future compromises. Finally, user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the host. Furthermore, the authentication server can't get any information for the session key between the two users and the mutual authentication will carry through between the server and the two users. The proposed protocol's security, simplicity, and speed make it ideal for a wide range of real-world applications in which secure password authentication is required.
[1]
Steven M. Bellovin,et al.
Encrypted key exchange: password-based protocols secure against dictionary attacks
,
1992,
Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[2]
Patrick Horster,et al.
Undetectable on-line password guessing attacks
,
1995,
OPSR.
[3]
Vitaly Shmatikov,et al.
Fast dictionary attacks on passwords using time-space tradeoff
,
2005,
CCS '05.
[4]
Jerome H. Saltzer,et al.
Protecting Poorly Chosen Secrets from Guessing Attacks
,
1993,
IEEE J. Sel. Areas Commun..
[5]
Thomas D. Wu.
A Real-World Analysis of Kerberos Password Security
,
1999,
NDSS.
[6]
Gene Tsudik,et al.
Refinement and extension of encrypted key exchange
,
1995,
OPSR.