@article{ART001698061},
author={남정현 and Juryon Paik and Youngsook Lee and WON, DONGHO},
title={A Security Analysis of Zhao and Gu's Key Exchange Protocol},
journal={Journal of The Korea Society of Computer and Information},
issn={1598-849X},
year={2012},
volume={17},
number={9},
pages={91-101}
TY - JOUR
AU - 남정현
AU - Juryon Paik
AU - Youngsook Lee
AU - WON, DONGHO
TI - A Security Analysis of Zhao and Gu's Key Exchange Protocol
JO - Journal of The Korea Society of Computer and Information
PY - 2012
VL - 17
IS - 9
PB - The Korean Society Of Computer And Information
SP - 91
EP - 101
SN - 1598-849X
AB - Key exchange protocols are essential for building a secure communication channel over an insecure open network. In particular, password-based key exchange protocols are designed to work when user authentication is done via the use of passwords. But, passwords are easy for human beings to remember, but are low entropy and thus are subject to dictionary attacks. Recently, Zhao and Gu proposed a new server-aided protocol for password-based key exchange. Zhao and Gu’s protocol was claimed to be provably secure in a formal adversarial model which captures the notion of leakage of ephemeral secret keys. In this paper, we mount a replay attack on Zhao and Gu’s protocol and thereby show that unlike the claim of provable security, the protocol is not secure against leakage of ephemeral secret keys. Our result implies that Zhao and Gu’s proof of security for the protocol is invalid.
KW - Security;Key exchange protocol;Password;Attack
DO -
UR -
ER -
남정현, Juryon Paik, Youngsook Lee and WON, DONGHO. (2012). A Security Analysis of Zhao and Gu's Key Exchange Protocol. Journal of The Korea Society of Computer and Information, 17(9), 91-101.
남정현, Juryon Paik, Youngsook Lee and WON, DONGHO. 2012, "A Security Analysis of Zhao and Gu's Key Exchange Protocol", Journal of The Korea Society of Computer and Information, vol.17, no.9 pp.91-101.
남정현, Juryon Paik, Youngsook Lee, WON, DONGHO "A Security Analysis of Zhao and Gu's Key Exchange Protocol" Journal of The Korea Society of Computer and Information 17.9 pp.91-101 (2012) : 91.
남정현, Juryon Paik, Youngsook Lee, WON, DONGHO. A Security Analysis of Zhao and Gu's Key Exchange Protocol. 2012; 17(9), 91-101.
남정현, Juryon Paik, Youngsook Lee and WON, DONGHO. "A Security Analysis of Zhao and Gu's Key Exchange Protocol" Journal of The Korea Society of Computer and Information 17, no.9 (2012) : 91-101.
남정현; Juryon Paik; Youngsook Lee; WON, DONGHO. A Security Analysis of Zhao and Gu's Key Exchange Protocol. Journal of The Korea Society of Computer and Information, 17(9), 91-101.
남정현; Juryon Paik; Youngsook Lee; WON, DONGHO. A Security Analysis of Zhao and Gu's Key Exchange Protocol. Journal of The Korea Society of Computer and Information. 2012; 17(9) 91-101.
남정현, Juryon Paik, Youngsook Lee, WON, DONGHO. A Security Analysis of Zhao and Gu's Key Exchange Protocol. 2012; 17(9), 91-101.
남정현, Juryon Paik, Youngsook Lee and WON, DONGHO. "A Security Analysis of Zhao and Gu's Key Exchange Protocol" Journal of The Korea Society of Computer and Information 17, no.9 (2012) : 91-101.