An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network

  • Zhigang Gao
  • Dengguo Feng
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6151)


Password-based Authenticated Key Agreement (PAKA) protocols are widely used in wireless mobile networks, however many existing PAKA protocols have security flaws. In the 3GPP2 network, there are several PAKA protocols proposed to enhance the security of the Authentication Key distribution mechanism which is subjected to the Man-In-The-Middle attack. We point out the security flaws of such protocols in [10,6] and give two practical attacks on them. Moreover we propose an enhanced PAKA protocol which can resist both undetectable on-line and off-line password guessing attacks, and formally analyze its security in the random oracle model. In addition, we consider a special version of Diffie-Hellman problem called Degenerate Diffie-Hellman problem and propose two assumptions called Computational and Decisional Degenerate Diffie-Hellman assumption which are as difficult as CDH assumption and DDH assumption respectively.


Elliptic Curve Wireless Local Area Network Random Oracle Elliptic Curve Cryptology Random Oracle Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Aboba, B., Blunk, L., Vollbrecht, J., Levkowetz, H., Carlson, J.: Extensible authentication protocol (eap). Technical report, The Internet Engineering Task Force. RFC 3748 (June 2004)Google Scholar
  2. 2.
    Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139–155. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  3. 3.
    Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM Conference on Computer and Communications Security, pp. 62–73 (1993)Google Scholar
  4. 4.
    Bellare, M., Rogaway, P.: Collision-resistant hashing: Towards making uowhfs practical. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 470–484. Springer, Heidelberg (1997)Google Scholar
  5. 5.
    Bersani, F., Tschofenig, H.: The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method. Technical report, The Internet Engineering Task Force. RFC 4764 (January 2007)Google Scholar
  6. 6.
    Chang, C.C., Chang, S.C.: An Improved Authentication Key Agreement Protocol Based on Elliptic Curve for Wireless Mobile Networks. In: IIHMSP 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1375–1378 (2008)Google Scholar
  7. 7.
    3GPP2 C.S0016-B. Over-the-air service provisioning of mobile stations in spread spectrum standards. Technical report (October 2002),
  8. 8.
    Ding, Y., Horster, P.: Undetectable on-line password guessing attacks. ACM SIGOPS Operating Systems Review 29(4), 77–86 (1995)CrossRefGoogle Scholar
  9. 9.
    Halevi, S., Krawczyk, H.: Public-key cryptography and password protocols. ACM Trans. Inf. Syst. Secur. 2(3), 230–268 (1999)CrossRefGoogle Scholar
  10. 10.
    Lu, R., Cao, Z., Zhu, H.: An enhanced authenticated key agreement protocol for wireless mobile communication. Computer Standards & Interfaces 29(6), 647–652 (2007)CrossRefGoogle Scholar
  11. 11.
    3GPP2 N.S0011-0. Otasp and otapa. Technical report, (January 1999)
  12. 12.
    Seo, D.H., Sweeney, P.: Simple authenticated key agreement algorithm. Electronics Letters 35, 1073 (1999)CrossRefGoogle Scholar
  13. 13.
    Singhal, A., Garg, V., Mathuria, A.: Analysis and Enhancement of Two Key Agreement Protocols for Wireless Networks. In: 2nd International Conference on Communication Systems Software and Middleware, COMSWARE 2007, pp. 1–7 (2007)Google Scholar
  14. 14.
    Sui, A., Hui, L.C.K., Yiu, S.M., Chow, K.P., Tsang, W.W., Chong, C.F., Pun, K.H., Chan, H.W.: An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication. In: 2005 IEEE Wireless Communications and Networking Conference, vol. 4 (2005)Google Scholar
  15. 15.
    Wan, Z., Zhu, B., Deng, R.H., Bao, F., Ananda, A.L.: Dos-resistant access control protocol with identity confidentiality for wireless networks. In: 2005 IEEE Wireless Communications and Networking Conference, vol. 3 (2005)Google Scholar
  16. 16.
    Wan, Z., Ananda, A.L., Deng, R.H., Bao, F.: Anonymous dos-resistant access control protocol using passwords for wireless networks. In: LCN, pp. 328–335. IEEE Computer Society, Los Alamitos (2005)Google Scholar
  17. 17.
    Zhang, Z., Feng, D.: On Password-based Key Exchange with Enhanced Security. In: The 4rd SKLOIS Workshop on Security Protocols, pp. 132–144 (2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Zhigang Gao
    • 1
    • 2
  • Dengguo Feng
    • 1
  1. 1.State Key Laboratory of Information SecurityInstitute of Software, Chinese Academy of SciencesBeijingChina
  2. 2.National Engineering Research Center of Information SecurityBeijingChina

Personalised recommendations