Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract)

  • Duncan S. Wong
  • Agnes H. Chan
  • Feng Zhu
Conference paper

DOI: 10.1007/978-3-540-31957-3_93

Volume 3421 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Wong D.S., Chan A.H., Zhu F. (2005) Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract). In: Lorenz P., Dini P. (eds) Networking - ICN 2005. ICN 2005. Lecture Notes in Computer Science, vol 3421. Springer, Berlin, Heidelberg

Abstract

With the advancement of wireless technology and the increasing demand for resource-constrained mobile devices, secure and efficient password authenticated key exchange (PAKE) protocols are needed for various kinds of secure communications among low-power wireless devices. In this paper, we introduce an elliptic curve based password-keyed permutation family and use it to construct a PAKE in such a way that it is suitable for efficient implementation on low-power devices. The computation time on each side of our PAKE is estimated to be about 3.4 seconds and can be reduced to 1.5 seconds with precomputation on an embedded device with a low-end 16MHz DragonBall-EZ microprocessor. On its security, we show that the password-keyed permutation family is secure against offline dictionary attack under the assumption that the elliptic curve computational Diffie-Hellman problem is intractable.

Index Terms: Authentication Protocol, Key Exchange, Wireless Communications.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Duncan S. Wong
    • 1
  • Agnes H. Chan
    • 2
  • Feng Zhu
    • 2
  1. 1.Department of Computer ScienceCity University of Hong KongHong Kong
  2. 2.College of Computer and Information ScienceNortheastern UniversityBostonU.S.A