Open Access   Article Go Back

Probe of Password Authenticated 3P-EKE Protocols

Archana Raghuvamshi1 , Premch 2 , Parvataneni 3

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-12 , Page no. 10-22, Dec-2015

Online published on Dec 31, 2015

Copyright © Archana Raghuvamshi, Premch , Parvataneni . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Archana Raghuvamshi, Premch , Parvataneni, “Probe of Password Authenticated 3P-EKE Protocols,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.10-22, 2015.

MLA Style Citation: Archana Raghuvamshi, Premch , Parvataneni "Probe of Password Authenticated 3P-EKE Protocols." International Journal of Computer Sciences and Engineering 3.12 (2015): 10-22.

APA Style Citation: Archana Raghuvamshi, Premch , Parvataneni, (2015). Probe of Password Authenticated 3P-EKE Protocols. International Journal of Computer Sciences and Engineering, 3(12), 10-22.

BibTex Style Citation:
@article{Raghuvamshi_2015,
author = {Archana Raghuvamshi, Premch , Parvataneni},
title = {Probe of Password Authenticated 3P-EKE Protocols},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2015},
volume = {3},
Issue = {12},
month = {12},
year = {2015},
issn = {2347-2693},
pages = {10-22},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=734},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=734
TI - Probe of Password Authenticated 3P-EKE Protocols
T2 - International Journal of Computer Sciences and Engineering
AU - Archana Raghuvamshi, Premch , Parvataneni
PY - 2015
DA - 2015/12/31
PB - IJCSE, Indore, INDIA
SP - 10-22
IS - 12
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2735 2550 downloads 2431 downloads
  
  
           

Abstract

To establish a secure communication over unreliable networks, Password-Authenticated Encrypted Key Exchange (PA-EKE) protocols plays a pivotal role. Diffie & Hellman (D-H) (1976) proposed a first key agreement protocol, which is suffered from man-in-the-middle attack. To overcome a flaw, many authors proposed password-authenticated key agreement protocols. Chang & Chang (2004) proposed a novel password-authenticated 3P-EKE protocol with round efficiency. In contrast, Yoon & Yoo (2008) notified an undetectable online dictionary attack on this protocol and proposed an improvement over it. Later, Padmavathy et al. cryptanalyzed the Yoon-Yoo’s protocol and proposed PSRJ Protocol. Subsequently, Archana et al. (2012) notified a detectable online dictionary attack on PSRJ Protocol. Afterward, an improvement over the Yoon-Yoo’s protocol is proposed by Raj et al. (2013), which is cryptanalyzed by Archana et al. (2013). In this paper we have analyzed all the above protocols at their performance level.

Key-Words / Index Term

Password authentication, Encrypted Key Exchange (EKE), Three Party-EKE Protocols, , Detectable On-line Dictionary Attacks, Undetectable On-line Dictionary Attacks.

References

[1] Chin-Chen Chang*, Ya-fen Chang, “A novel three-party encrypted key exchange protocol”, Elsevier, Computer Standards & Interfaces, Volume-26, Issue/No-5, Page No (471 – 476), 2004.
[2] Y. Ding and P. Horster, “Undetectable on-line password guessing attacks,” ACM Operating Systems Review, Volume-9, Issue/No-4, Page no (77-86), 1995.
[3] W. Diffie and M. E. Hellman. “New directions in cryptography”. IEEE Transactions on Information Theory, Volume-22, Issue/No-6, Page No (644– 654), 1976.
[4] S.M. Bellovin and M. Merritt, “Encrypted key exchange: password-based protocols secure against password guessing attacks,” in Proc. of 1992 IEEE Symposium on Research in Security and Privacy, Page No (72–84), 1992.
[5] M. Steiner, G. Tsudik, and M. Waidner, “Refinement and extension of encrypted key exchange”, ACM Operating Systems Review, Volume-29, Issue/No-5, Page No (22-30), 1995.
[6] C. L. Lin, H. M. Sun, and T. Hwang, “Three party encrypted key exchange: attacks and a solution”, ACM Operating Systems Review, Volume -34, Issue/No-4, Page No (12-20), 2002.
[7] Feng Zhu, Duncan S. Wong, Agnes H. Chan, Robbie Ye ”Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks” Information Security, Lecture Motes in Computer Science, Volume -2433, Page No (150-161), 2002.
[8] Yeh H-T, Sun H-M, Hwang T, “Efficient three-party authentication and key agreement protocols resistant to password guessing attacks”, Journal of Information Science and Engineering, Volume-19, Issue/No-6, Page No (1059-1070), 2003.
[9] T. f. Lee, T. Hwang, and C. L. Lin, “Enhanced three party encrypted key exchange without server public Keys”. Computers and Security, Volume-23, Issue/No-7, Page No (571-577), 2004.
[10] Eun-Jun Yoon, Kee-Young Yoo, “Improving the novel three-party encrypted key exchange protocol”, Elsevier, Computer Standards and Interfaces, Volume-30, Issue/No-5, Page No (309-314) , 2008.
[11] R.Padmavathy , Tallapally Shirisha , M.Rajkumar , JayadevGyani, “Improved analysis on Chang and Chang Password Key Exchange Protocol”, IEEE International Conference on Advances in Computing, Control, and Telecommunication Technologies, Page No (781-783), 2009.
[12] Archana Raghuvamshi, P.Venkateshwara Rao,and Prof.P.Premchand , “Cryptanalysis of Authenticated Key Exchange 3P-EKE Protocol and its Enhancement”, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012), Page No (659-666), March 30-31, 2012.
[13] P.Rajkumar, C.Manoharan, M.Ananthi, “Performance Analysis Of 3pek Exchange Protocol Using Parallel Message Transmission Technique”, International Journal of Engineering Research & Technology (IJERT), Volume-1, Issue/No-7, Page No (1-5) Sep 2012.
[14] Archana Raghuvamshi , Prof.P.Premchand ,“A Weakness in 3pek Exchange Protocol using Parallel Message Transmission Technique”, International Journal of Advanced Research in Computer Science(IJARCS), Volume-4, Issue/No-11, Page No (104-108), Dec 2013
[15] Y. Gertner, T. Malkin, O. Reingold, “On the impossibility of basing trapdoor functions on trapdoor predicates”, Proceedings of the 42nd IEEE Symposium on foundations of Computer Science, Las Vegas, Mevada, Page No (126 – 135), Oct 2001.