Abstract
Group Diffie-Hellman schemes for password-based key exchange are designed to provide a pool of players communicating over a public network, and sharing just a human-memorable password, with a session key (e.g, the key is used for multicast data integrity and confidentiality). The fundamental security goal to achieve in this scenario is security against dictionary attacks. While solutions have been proposed to solve this problem no formal treatment has ever been suggested. In this paper, we define a security model and then present a protocol with its security proof in both the random oracle model and the ideal-cipher model.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
N. Asokan and P. Ginzboorg. Key Agreement in Ad-hoc Networks. Computer Communications, 23(18):1627–1637, 2000.
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated Key Exchange Secure Against Dictionary Attacks. In B. Preneel, editor, Proc. of Eurocrypt’ 00, LNCS 1807, pages 139–155. Springer-Verlag, 2000.
S. M. Bellovin and M. Merrit. Encrypted Key Exchange: Password-based Protocols Secure against Dictionary Attacks. In Proc. of the Symposium on Security and Privacy, pages 72–84. IEEE, 1992.
J. Black and P. Rogaway. Ciphers with Arbitrary Finite Domains. In Proc. of the RSA Cryptographer’s Track (RSA CT’ 02), LNCS 2271, pages 114–130. Springer-Verlag, 2002.
Bluetooth. Specification of the Bluetooth System, December 1999. Available at http://www.bluetooth.com/developer/specification/specification.asp.
D. Boneh. The Decision Diffie-Hellman Problem. In Third Algorithmic Number Theory Symposium, LNCS 1423, pages 48–63. Springer-Verlag, 1998.
V. Boyko, P. MacKenzie, and S. Patel. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. In B. Preneel, editor, Proc. of Eurocrypt’ 01, LNCS 1807, pages 156–171. Springer-Verlag, 2000.
E. Bresson, O. Chevassut, and D. Pointcheval. Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks. In Y. Zheng, editor, Proc. of Asiacrypt’ 2002. Springer, December 2002. Full Version-http://www.di.ens.fr/users/pointche.
E. Bresson, O. Chevassut, and D. Pointcheval. The Group Diffie-Hellman Problems. In H. Heys and K. Nyberg, editors, Proc. of SAC’ 2002, LNCS. Springer-Verlag, August 2002.
E. Bresson, O. Chevassut, D. Pointcheval, and J. J. Quisquater. Provably Authenticated Group Diffie-Hellman Key Exchange. In Proc. of 8th ACM Conference on Computer and Communications Security, pages 255–264, November 2001.
W. Diffie and M. Hellman. New Directions In Cryptography. In IEEE Transactions on Information Theory, volume IT-22(6), pages 644–654, November 1976.
O. Goldreich and Y. Lindell. Session-Key Generation using Human Passwords Only. In J. Kilian, editor, Proc. of Crypto’ 01, LNCS 2139, pages 408–432. Springer-Verlag, August 2001.
M. Jakobsson and S. Wetzel. Security Weaknesses in Bluetooth. In Proc. of the RSA Cryptographer’s Track (RSA CT’ 01), LNCS 2020, pages 176–191. RSA Data Security, Springer-Verlag, 2001.
J. Katz, R. Ostrovsky, and M. Yung. Efficient Password-Authenticated Key Exchange using Human-Memorable Passwords. In Proc. of Eurocrypt’ 01, LNCS 2045, pages 475–494. Springer-Verlag, May 2001.
P. MacKenzie. More Efficient Password Authenticated Key Exchange. In D. Nacache, editor, RSA Conference’ 01, LNCS 2020, pages 361–377. Springer-Verlag, 2001.
M. Naor and O. Reingold. Number-Theoretic Constructions of Efficient Pseudo-Random Functions. In Proc. of 38th FOCS, pages 458–467. IEEE, 1997.
NIST. AES, December 2000. Available at http://www.nist.gov/aes.
K. Obraczka, G. Tsudik, and K. Viswanath. Pushing the Limits of Multicast in Ad Hoc Networks. In International Conference on Distributed Computing Systems, April 2001.
C. E. Perkins. Ad Hoc Networking. Addison Wesley, 2001.
V. Shoup. OAEP Reconsidered. In J. Kilian, editor, Proc. of Cryto’ 01, LNCS 2139, pages 239–259. Springer-Verlag, 2001.
L. Zhou and Z. J. Haas. Securing Ad Hoc Networks. IEEE Network Magazine, 13(6), 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bresson, E., Chevassut, O., Pointcheval, D. (2002). Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks. In: Zheng, Y. (eds) Advances in Cryptology — ASIACRYPT 2002. ASIACRYPT 2002. Lecture Notes in Computer Science, vol 2501. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36178-2_31
Download citation
DOI: https://doi.org/10.1007/3-540-36178-2_31
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00171-3
Online ISBN: 978-3-540-36178-7
eBook Packages: Springer Book Archive