Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract)
With the advancement of wireless technology and the increasing demand for resource-constrained mobile devices, secure and efficient password authenticated key exchange (PAKE) protocols are needed for various kinds of secure communications among low-power wireless devices. In this paper, we introduce an elliptic curve based password-keyed permutation family and use it to construct a PAKE in such a way that it is suitable for efficient implementation on low-power devices. The computation time on each side of our PAKE is estimated to be about 3.4 seconds and can be reduced to 1.5 seconds with precomputation on an embedded device with a low-end 16MHz DragonBall-EZ microprocessor. On its security, we show that the password-keyed permutation family is secure against offline dictionary attack under the assumption that the elliptic curve computational Diffie-Hellman problem is intractable.
Index Terms: Authentication Protocol, Key Exchange, Wireless Communications.
Unable to display preview. Download preview PDF.
- 5.IEEE. P1363 - 2000: Standard Specifications For Public Key Cryptography (2000)Google Scholar
- 6.IEEE. P1363.2 / D15: Standard Specifications for Password-based Public Key Cryptographic Techniques (May 2004)Google Scholar
- 8.Jablon, D.: Extended password key exchange protocols immune to dictionary attack. In: Proc. of the WETICE 1997 Workshop on Enterprise Security, Cambridge, MA, USA (June 1997)Google Scholar
- 9.Kobara, K., Imai, H.: Pretty-simple password-authenticated key-exchange under standard assumptions. IEICE Trans. E85-A(10), 2229–2237 (2002)Google Scholar
- 14.Wang, Y.: EC-SRP. Submission to IEEE P1363 Study Group, June 2001, updated May 2002 (May 2002)Google Scholar
- 17.Wu, T.: The secure remote password protocol. In: 1998 Internet Society Symposium on Network and Distributed System Security, pp. 97–111 (1998)Google Scholar