Designing a Client-to-client Password-Authenticated Key Exchange Protocol

碩士 === 淡江大學 === 電機工程學系碩士班 === 99 === Before conducting secure communications, users must establish a higher security key for communication from memory low security Password security, this process is known as PAKE (Password-Authenticated Key Exchange), We list attacker may launch various attacks, W...

Full description

Bibliographic Details
Main Authors: Yi-Ping Liao, 廖宜平
Other Authors: 裝博任
Format: Others
Language:zh-TW
Published: 2011
Online Access:http://ndltd.ncl.edu.tw/handle/71610192614127640803
Description
Summary:碩士 === 淡江大學 === 電機工程學系碩士班 === 99 === Before conducting secure communications, users must establish a higher security key for communication from memory low security Password security, this process is known as PAKE (Password-Authenticated Key Exchange), We list attacker may launch various attacks, We also analysis of nearly years C2C protocol''s advantages, disadvantages and their vulnerability, then we strengthen protocol''s security. The proposed protocol mainly based Smart Card Framework Agreement to be improved, Smart Card protocol, Smart Card allows users to exchange information first, then use the mod calculation features to achieve the purpose of verification, use the calculation features of mod that allows transmission The information includes a random number, can resist the off-line dictionary attacks. We add Ding, who propose the protocol in 2009 use the a password on the authentication exchange Diffie-Hellman parameter approach, and then add the Diffie-Hellman and server''s private key to authentication package, so you can reach the outcome of password, Smart Card information and server''s private key constituents mutual protection. This paper use the Kazuki''s improving security module to verify the security of protocol, the improving security module can verify that the KCI, LEP attack current security module can not verify, we use this module to prove protocol can resist the BR, KCI, LEP attack. This paper also compared the cost of the protocols to demonstrate our protocol increases the scope of reasonable cost.