Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract)
نویسندگان
چکیده
With the advancement of wireless technology and the increasing demand for resource-constrained mobile devices, secure and efficient password authenticated key exchange (PAKE) protocols are needed for various kinds of secure communications among low-power wireless devices. In this paper, we introduce an elliptic curve based password-keyed permutation family and use it to construct a PAKE in such a way that it is suitable for efficient implementation on low-power devices. The computation time on each side of our PAKE is estimated to be about 3.4 seconds and can be reduced to 1.5 seconds with precomputation on an embedded device with a low-end 16MHz DragonBall-EZ microprocessor. The protocol can also be extended to an augmented version. On its security, we show that the password-keyed permutation family is secure against offline dictionary attack under the assumption that the elliptic curve computational Diffie-Hellman problem is intractable.
منابع مشابه
A Parallel Password-Authenticated Key Exchange Protocol for Wireless Environments
Keeping the communication security between two parties and reducing the computations are important issues, especially in a wireless network environment. Based on the most suitable protocol for wireless communication, we propose a novel parallel key exchange protocol to reduce the waiting time in this paper.
متن کاملMaking Password Authenticated Key Exchange Suitable for Resource-Constrained Industrial Control Devices
Connectivity becomes increasingly important also for small embedded systems such as typically found in industrial control installations. More and more use-cases require secure remote user access increasingly incorporating handheld based human machine interfaces, using wireless links such as Bluetooth. Correspondingly secure operator authentication becomes of utmost importance. Unfortunately, of...
متن کاملEmploying Secure and Efficient Password-Authenticated Key Exchange in Wireless Networks
The password-authenticated key exchange (PAKE) is an important tool to secure wireless communications. To counter possible malicious attacks in wireless communications, this paper develops a stronger new cross-realm client-to-client (C2C) PAKE protocol based on the smart card framework agreement. Employing the client passwords, smart card information and server private keys, the new PAKE protoc...
متن کاملAdaptive Weak Secrets for Authenticated Key Exchange*
This paper describes biometric-based cryptographic techniques that use weak secrets to provide strong, multi-factor and mutual authentication, and establish secure channels for subsequent communications. These techniques rely on lightweight cryptographic algorithms for confidential information exchange. Lightweight algorithms are suitable for use in resource constrained environments such as the...
متن کاملSecurity protocols in a nutshell
Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on securit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005