An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network
Password-based Authenticated Key Agreement (PAKA) protocols are widely used in wireless mobile networks, however many existing PAKA protocols have security flaws. In the 3GPP2 network, there are several PAKA protocols proposed to enhance the security of the Authentication Key distribution mechanism which is subjected to the Man-In-The-Middle attack. We point out the security flaws of such protocols in [10,6] and give two practical attacks on them. Moreover we propose an enhanced PAKA protocol which can resist both undetectable on-line and off-line password guessing attacks, and formally analyze its security in the random oracle model. In addition, we consider a special version of Diffie-Hellman problem called Degenerate Diffie-Hellman problem and propose two assumptions called Computational and Decisional Degenerate Diffie-Hellman assumption which are as difficult as CDH assumption and DDH assumption respectively.
KeywordsElliptic Curve Wireless Local Area Network Random Oracle Elliptic Curve Cryptology Random Oracle Model
Unable to display preview. Download preview PDF.
- 1.Aboba, B., Blunk, L., Vollbrecht, J., Levkowetz, H., Carlson, J.: Extensible authentication protocol (eap). Technical report, The Internet Engineering Task Force. RFC 3748 (June 2004)Google Scholar
- 3.Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM Conference on Computer and Communications Security, pp. 62–73 (1993)Google Scholar
- 4.Bellare, M., Rogaway, P.: Collision-resistant hashing: Towards making uowhfs practical. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 470–484. Springer, Heidelberg (1997)Google Scholar
- 5.Bersani, F., Tschofenig, H.: The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method. Technical report, The Internet Engineering Task Force. RFC 4764 (January 2007)Google Scholar
- 6.Chang, C.C., Chang, S.C.: An Improved Authentication Key Agreement Protocol Based on Elliptic Curve for Wireless Mobile Networks. In: IIHMSP 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1375–1378 (2008)Google Scholar
- 7.3GPP2 C.S0016-B. Over-the-air service provisioning of mobile stations in spread spectrum standards. Technical report (October 2002), http://www.3gpp2.org
- 11.3GPP2 N.S0011-0. Otasp and otapa. Technical report, http://www.3gpp2.org (January 1999)
- 13.Singhal, A., Garg, V., Mathuria, A.: Analysis and Enhancement of Two Key Agreement Protocols for Wireless Networks. In: 2nd International Conference on Communication Systems Software and Middleware, COMSWARE 2007, pp. 1–7 (2007)Google Scholar
- 14.Sui, A., Hui, L.C.K., Yiu, S.M., Chow, K.P., Tsang, W.W., Chong, C.F., Pun, K.H., Chan, H.W.: An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication. In: 2005 IEEE Wireless Communications and Networking Conference, vol. 4 (2005)Google Scholar
- 15.Wan, Z., Zhu, B., Deng, R.H., Bao, F., Ananda, A.L.: Dos-resistant access control protocol with identity confidentiality for wireless networks. In: 2005 IEEE Wireless Communications and Networking Conference, vol. 3 (2005)Google Scholar
- 16.Wan, Z., Ananda, A.L., Deng, R.H., Bao, F.: Anonymous dos-resistant access control protocol using passwords for wireless networks. In: LCN, pp. 328–335. IEEE Computer Society, Los Alamitos (2005)Google Scholar
- 17.Zhang, Z., Feng, D.: On Password-based Key Exchange with Enhanced Security. In: The 4rd SKLOIS Workshop on Security Protocols, pp. 132–144 (2009)Google Scholar