Skip to main content

On the Security of Lv et al.’s Three-Party Authenticated Key Exchange Protocol Using One-Time Key

  • Conference paper
Advanced Infocomm Technology (ICAIT 2012)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 7593))

Included in the following conference series:

Abstract

In 2012, Lv et al. proposed a new three-party authenticated key exchange (3PAKE) protocol using one-time key which aims to achieve more efficiency with the same security level of other existing 3PAKE protocols. Lv et al. claimed that their proposed 3PAKE protocol is secure against various known attacks. However, this paper points out Lv et al.’s 3PAKE protocol is still vulnerable to off-line dictionary attacks unlike their claim.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lin, C.-L., Sun, H.-M., Steiner, M., Hwang, T.: Three-party encrypted key exchange without server public-keys. IEEE Communications Letters 5, 497–499 (2001)

    Article  Google Scholar 

  2. Yeh, H.-T., Sun, H.-M., Hwang, T.: Efficient three-party authentication and key agreement protocols resistant to password guessing attacks. Journal of Information Science and Engineering 19, 1059–1070 (2003)

    Google Scholar 

  3. Lu, R., Cao, Z.: Simple three-party key exchange protocol. Computers & Security 26(1), 94–97 (2007)

    Article  Google Scholar 

  4. Abdalla, M., Pointcheval, D.: Simple password-based encrypted key exchange protocols. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 191–208. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Chung, H.-R., Ku, W.-C.: Three weaknesses in a simple three-party key exchange protocol. Inform. Sciences 178(1), 220–229 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  6. Guo, H., Li, Z., Mu, Y., Zhang, X.: Cryptanalysis of simple threeparty key exchange protocol. Computers & Security 27(1), 16–21 (2008)

    Article  Google Scholar 

  7. Phan, R.C.-W., Yau, W.-C., Goi, B.-M.: Cryptanalysis of simple three-party key exchange protocol (S-3PAKE). Inform. Sciences 178(13), 2849–2856 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  8. Chen, T., Lee, W.-B., Chen, H.-B.: A round-and computation-efficient three-party authenticated key exchange protocol. Journal of Systems and Software 81, 1581–1590 (2008)

    Article  Google Scholar 

  9. Yoon, E.-J., Yoo, K.-Y.: Improving the novel three-party encrypted key exchange protocol. Computers Standards & Interfaces 30, 309–314 (2008)

    Article  Google Scholar 

  10. Nam, J., Paik, J., Kang, H.-K., Kim, U.-M., Won, D.: An off-line dictionary attack on a simple three-party key exchange protocol. IEEE Commun. Lett. 13(3), 205–207 (2009)

    Article  Google Scholar 

  11. Huang, H.-F.: A simple three-party password-based key exchange protocol. International Journal of Communication Systems 22, 857–862 (2009)

    Article  Google Scholar 

  12. Lee, T.-F., Liu, J.-L., Sung, M.-J., Yang, S.-B., Chen, C.-M.: Communication-efficient three-party protocols for authentication and key agreement. Computers & Mathematics with Applications 58, 641–648 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  13. Yang, J.-H., Chang, C.-C.: An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. Journal of Systems and Software 82, 1497–1502 (2009)

    Article  Google Scholar 

  14. Debiao, H., Jianhua, C., Jin, H.: Cryptanalysis of a simple three-party key exchange protocol. Informatica 34, 337–339 (2010)

    MATH  Google Scholar 

  15. Kim, H.-S., Choi, J.-Y.: Enhanced password-based simple three-party key exchange protocol. Computers & Electrical Engineering 35, 107–114 (2009)

    Article  MATH  Google Scholar 

  16. Ding, Y., Horster, P.: Undetectable on-line password guessing attacks. ACM Operating Systems Review 29(4), 77–86 (1995)

    Article  Google Scholar 

  17. Kim, H.-J., Yoon, E.-J.: Cryptanalysis of an enhanced simple three-party key exchange protocol. Communications in Computer and Information Science 259, 167–176 (2011)

    Article  Google Scholar 

  18. Lv, C., Ma, M., Li, H., Ma, J., Zhang, Y.: An novel three-party authenticated key exchange protocol using one-time key. Journal of Network and Computer Applications (2012), http://dx.doi.org/10.1016/j.jnca.2012.04.006

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yoon, EJ. (2013). On the Security of Lv et al.’s Three-Party Authenticated Key Exchange Protocol Using One-Time Key. In: Guyot, V. (eds) Advanced Infocomm Technology. ICAIT 2012. Lecture Notes in Computer Science, vol 7593. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38227-7_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38227-7_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38226-0

  • Online ISBN: 978-3-642-38227-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics