Title: VerifierBased PasswordAuthenticated Key Exchange
1Verifier-Based Password-Authenticated Key
Exchange
Jeong Ok Kwon December 17th, 2005
2Motivation
- A fundamental problem in cryptography is how to
communicate securely over an insecure channel.
3Motivation
- How can we obtain a secret session key?
- Public-key encryption or signature
- too high for certain applications
- Password-Authenticated Key Exchange (PAKE)
- PAKE is to share a secret key between specified
parties using just a human-memorable password. - convenience, mobility, and less hardware
requirement - no security infrastructure
4Intrinsic Problem
- Low-entropy of passwords
- i.e., 4 or 8 characters such as natural language
phrase to be easily memorized. - So they are susceptible to dictionary attacks.
- On-line dictionary attacks
- Off-line dictionary attacks
Even tiny amounts of redundancy in the flows of
the protocol could be used by the adversary to
mount dictionary attacks. -gt Protocol for PAKE
must be immune to off-line attacks
5Classification for PAKE
6Our work is about
- In the Client/Server model
- Verifier-based PAKE
- for two-party with same passwords
- for two-party with different passwords
- for multi-party with different passwords
7Our work is about
- In the Client/Server model
- Verifier-based PAKE
- for two-party with same passwords
- for two-party with different passwords
- for multi-party with different passwords
(pw1 )
U1
Server
8Our work is about
- In the Client/Server model
- Verifier-based PAKE
- for two-party with same passwords
- for two-party with different passwords
- for multi-party with different passwords
(pw1 )
(pw2 )
U1
U2
Server
9Our work is about
- In the Client/Server model
- Verifier-based PAKE
- for two-party with same passwords
- for two-party with different passwords
- for multi-party with different passwords
(pw4 )
U4
(pw1 )
(pw3 )
U3
U1
(pw2 )
U2
10Symmetric model vs. Verifier-based model
- Symmetric model
- the server stores a plaintext-form of a password.
- Asymmetric model (or verifier-based)
- the server stores a verifier for a password.
11Symmetric model vs. Verifier-based model
- Asymmetric model (or verifier-based)
- the server stores a verifier for a password.
(pw1)
A verifier is the information computed from a
password. It is computable from the password
whereas the reverse is infeasible in polynomial
time.
12Symmetric model vs. Verifier-based model
- Asymmetric model (or verifier-based)
- it is designed to protect against server
compromise so that an attacker that is able to
steal a password file from a server cannot later
masquerade as a legitimate user without
performing dictionary attacks.
(pw1)
13Symmetric model vs. Verifier-based model
- Symmetric model
- the server stores a plaintext-form of a password.
14Symmetric model vs. Verifier-based model
- Asymmetric model (or verifier-based)
- even if the password file is compromised, the
attacker has to perform additional off-line
dictionary attacks to find out passwords of the
clients. - It will give the server systems administrator
time to react and to inform its clients, which
would reduce the damage of the corruption.
(pw1)
15Comparison with the related verifier-based
protocol
p length of a prime of Zp, l length
of an output of a hash/MAC function, n
number of members in a group
- EPA Y. H. Hwang, D. H. Yum, and P. J. Lee,
EPA An Efficient Password-Based Protocol for
Authenticated Key Exchange, ACISP 2003.
16Comparison with the related verifier-based
protocol
- B-SPEKE D. Jablon, Extended password key
exchange protocols immune to dictionary attack,
In WETICE97 Workshop on Enterprise Security,
1997. - SRP T. Wu, Secure remote password
protocol, Proceedings of the ISOC NDSS
Symposium, pages 99111, 1998. - AMP T. Kwon, Authentication and key
agreement via memorable password, Proceedings of
the ISOC NDSS Symposium, 2001. - PAK-Z P. MacKenzie, The PAK suit Protocols
for Password-Authenticated Key Exchange,
http//grouper.ieee.org/groups/1363/passwdPK/contr
ibutions.htmlMac02, April, 2002. - EPA Y. H. Hwang, D. H. Yum, and P. J.
Lee, EPA An Efficient Password-Based Protocol
for Authenticated Key Exchange, ACISP 2003. - VB-EKE M. Abdalla, O. Chevassut, and D.
Pointcheval, One-time Verifier-based Encrypted
Key Exchange, PKC 05
17Comparison with the related verifier-based
protocol
- B-SPEKE D. Jablon, Extended password key
exchange protocols immune to dictionary attack,
In WETICE97 Workshop on Enterprise Security,
1997. - SRP T. Wu, Secure remote password
protocol, Proceedings of the ISOC NDSS
Symposium, pages 99111, 1998. - AMP T. Kwon, Authentication and key
agreement via memorable password, Proceedings of
the ISOC NDSS Symposium, 2001. - PAK-Z P. MacKenzie, The PAK suit Protocols
for Password-Authenticated Key Exchange,
http//grouper.ieee.org/groups/1363/passwdPK/contr
ibutions.htmlMac02, April, 2002.
18Comparison with the related verifier-based
protocol
p length of a prime of Zp, l length
of an output of a hash/MAC function, n
number of members in a group
The focus of this work is on the round-efficient
verifier-based PAKE protocol
- EPA Y. H. Hwang, D. H. Yum, and P. J. Lee,
EPA An Efficient Password-Based Protocol for
Authenticated Key Exchange, ACISP 2003.
19Comparison with the related verifier-based
protocol
p length of a prime of Zp, l length
of an output of a hash/MAC function, n
number of members in a group
The focus of this work is on round-efficient
verifier-based PAKE protocol
The focus of this work is to construct secure
and round-efficient verifier-based PAKE protocols
for 2-/multi-party with different passwords
20Preliminary for our protocols
- Public information
- G a finite cyclic group has order q
- p a safe prime such that p2q1
- g1,g2 generators of G
- H a collision-resistant one-way hash function
- Mac(Key.gen,Mac.gen,Mac.ver)a secure message
authentication code - Initialization step
- Ui selects a password pwi
- Ui registers vi,1 g1H(UiSpwi) mod p and
vi,2 g2H(UiSpwi) mod p (verifiers of the
password) to the server S over a secure channel. - S stores them in a password file with an entry
for each user Ui.
21Verifier-based PAKE for 2-party with same
passwords
U1
Server
22Verifier-based PAKE for 2-party with different
passwords
- Motivation
- PAKE for 2-party with same passwords
- If a user wants to communicate securely with many
users? - the number of passwords that the user needs to
memorize may be increased linearly with the
number of possible partners.
23Verifier-based PAKE for 2-party with different
passwords
- Motivation
- PAKE for 2-party with different passwords
- each user only shares a password with a trusted
server. - the trusted server helps the users with different
passwords to agree on a common session key.
24 U1
Server
U2
25Verifier-based PAKE for multi-party with
different passwords
- Motivation
- PAKE for multi-party with same passwords
- If a user wants to communicate securely with many
groups? - the number of passwords that the user needs to
memorize may be increased linearly with the
number of possible groups. - the member have to newly share a password
whenever one wants to communicate securely with
new groups
(pw )
(pw )
(pw )
Group with sk
(pw )
26Verifier-based PAKE for multi-party with
different passwords
- Motivation
- PAKE for multi-party with different passwords
- each user only shares a password with a trusted
server. - the trusted server helps the users with different
passwords to agree on a group key.
(pw1 )
(pw4 )
(pw2 )
Group with sk
(pw3 )
27Verifier-based PAKE for multi-party with
different passwords
R1
Server
28Verifier-based PAKE for multi-party with
different passwords
R1
Server
29Verifier-based PAKE for multi-party with
different passwords
R2
Server
30Verifier-based PAKE for multi-party with
different passwords
R3
31Verifier-based PAKE for multi-party with
different passwords
R3
32Security Goal Verifier-based PAKE
- Security against dictionary attacks
- passive eavesdropping does not help the adversary
in computing any information about the password. - only interactions with the instances help the
adversary in computing information about the
password. - Key secrecy
- no computationally bounded adversary (including
the server) should learn anything about session
keys shared between honest parties. - Server-compromise attack
- even if an adversary steal the password file from
the server, the adversary still cannot
impersonate a user without performing dictionary
attacks on the password file.
33Security Goal Verifier-based PAKE
- Forward secrecy
- the expose of a password does not compromise the
previous session keys. - Denning-Sacco attack
- even with the session key from an eavesdropped
session an adversary cannot gain the ability to
impersonate the user directly. - an outsider attacker cannot gain the ability to
performing off-line dictionary attacks against
the passwords of users from using the compromised
session keys which are successfully established
between honest entities. - an insider attacker that knows ones password
does not learn any information about other users
passwords from the successfully established
session key with the other.
34Q A