Password-Based Encryption Analyzed
نویسندگان
چکیده
The use of passwords in security protocols is particularly delicate because of the possibility of off-line guessing attacks. We study password-based protocols in the context of a recent line of research that aims to justify symbolic models in terms of more concrete, computational ones. We offer two models for reasoning about the concurrent use of symmetric, asymmetric, and passwordbased encryption in protocol messages. In each of the models we define a notion of equivalence between messages and also characterize when passwords are used securely in a message or in a set of messages. Our new definition for the computational security of password-based encryption may be of independent interest. The main results of this paper are two soundness theorems. We show that under certain (standard) assumptions about the computational implementation of the cryptographic primitives, symbolic equivalence implies computational equivalence. More importantly, we prove that symbolically secure uses of passwords are also computationally secure.
منابع مشابه
Enhanced Password Authentication the Dynamic Password Unrevealed
Advanced Password Encryption Technology Based On The New Concept Of Dynamic Passwords For Users Based On Their Current Location/Time/Parameters. The Basic Password Remains Intact & Users Enter Few 2-3 Additional Information Characters In Addition To Basic Password Which Are Dynamic & Provided At Run Time.
متن کاملNote on 'Design of improved password authentication and update scheme based on elliptic curve cryptography'
Secured password authentication and update of passwords are two essential requirements for remote login over unreliable networks. In this paper, an elliptic curve cryptography (ECC) based technique has been proposed that not only satisfies the above two requirements, but also provides additional security requirements that are not available in some schemes proposed so far. For instances, the Pey...
متن کاملNew Anonymity Notions for Identity-Based Encryption
Identity-based encryption is a very convenient tool to avoid key management. Recipient-privacy is also a major concern nowadays. To combine both, anonymous identity-based encryption has been proposed. This paper extends this notion to stronger adversaries (the authority itself). We discuss this new notion, together with a new kind of non-malleability with respect to the identity, for several ex...
متن کاملAn Overview of the PKCS Standards
This note gives an overview of the PKCS family of standards for public-key cryptography. These standards cover RSA encryption, Diffie-Hellman key agreement, password-based encryption, extended-certificate syntax, cryptographic message syntax, private-key information syntax, and certification request syntax, as well as selected attributes. The note gives the motivation for the standards and disc...
متن کاملDesign and Implementation of a Lock-Key Image Encryption and Decryption, based on a User Provided Password
This paper is about encryption and decryption of images using a secret password provided by the user. The encryption machine takes the password and the source image as input and generates a key pattern image by using Secure Hash Algorithm (SHA) and a lock image by using Mcrypt algorithm. It provides additional security using Image scrambling. The decryption machine takes the lock image, key ima...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005