Parallelizable Password-Authenticated Key Exchange Protocol

Boyko et al. presented two protocols called PAK and PAK-X which are the password-authenticated key exchange protocol based on the Diffie-Hellman algorithm to provide a formal proof of security in the random oracle model. These protocols have very good property and were submitted to IEEE P1363.2 for public key cryptography: password-based techniques. However, they are not the most efficient methods in the perspective of the total execution time because they do not provide parallelizability to each party. Therefore, the purpose of this paper is to speed up these schemes by supporting parallel computability to both parties. This paper proposes two protocols, PPAK and PPAK-X, which are parallelizable password-authenticated key exchange protocols while maintaining provable security in PAK and PAK-X by simply modifying their structures.

[1]  Taekyoung Kwon,et al.  Secure agreement scheme for gxy via password authentication , 1999 .

[2]  Bart Preneel,et al.  Advances in cryptology - EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 : proceedings , 2000 .

[3]  Jerome H. Saltzer,et al.  Reducing risks from poorly chosen keys , 1989, SOSP '89.

[4]  Tatsuaki Okamoto,et al.  Advances in Cryptology — ASIACRYPT 2000 , 2000, Lecture Notes in Computer Science.

[5]  Mihir Bellare,et al.  Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.

[6]  Steven M. Bellovin,et al.  Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[7]  Sarvar Patel,et al.  Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman , 2000, EUROCRYPT.

[8]  Taekyoung Kwon,et al.  A Study on the Generalized Key Agreement and Password Authentication Protocol , 2000 .

[9]  Thomas D. Wu The Secure Remote Password Protocol , 1998, NDSS.

[10]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[11]  Taekyoung Kwon,et al.  Ultimate solution to authentication via memorable password , 2000 .

[12]  David P. Jablon Extended password key exchange protocols immune to dictionary attack , 1997, Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises.