论文部分内容阅读
基于口令的认证密钥交换协议是一类密码学原语,其利用共享的低熵口令获得更安全的会话密钥.J-PAKE协议是由Hao和Ryan提出的一种口令认证密钥交换协议,其设计者声称该协议满足若干种基本的安全属性,包括抵抗离线/在线字典攻击、抵抗已知密钥攻击和具备前向安全性.值得注意的是,作为一种实验性认证协议,J-PAKE协议已经在Open SSL等广泛使用的Internet协议中被实现,因此有必要对该协议展开深入的研究.在本文中,借助Bellare等人提出的安全模型,描述了一种针对J-PAKE协议的密钥复制攻击,攻破该协议的会话密钥语义安全性,并指出存在该类攻击的根本原因.进一步,我们借助一种通用的方案修复该协议,使得改进后的协议能够抵抗上述攻击.最后,将J-PAKE协议与若干相关的口令认证密钥交换协议进行比较,重点考察J-PAKE协议的计算与通信效率,并给出若干评价作为总结.
Password-based authentication The key exchange protocol is a type of cryptographic primitive that uses a shared low-entropy password to obtain a more secure session key. The J-PAKE protocol is a password authentication key exchange protocol proposed by Hao and Ryan , Whose designers claim that the protocol satisfies several basic security attributes, including resistance to off-line / online dictionary attacks, resistance to known key attacks, and forward-looking security. It is worth noting that as an experimental authentication protocol, J The -PAKE protocol has been implemented in widely used Internet protocols such as Open SSL, so it is necessary to study the protocol in-depth.In this paper, with the help of the security model proposed by Bellare et al., A protocol for J-PAKE protocol , And breaks through the semantic security of the session key of the protocol and points out the root cause of such an attack.Furthermore, we repair the protocol with a general scheme to make the improved protocol can resist the above attacks. Finally, the J-PAKE protocol is compared with several related password authentication key exchange protocols, with emphasis on the calculation and communication efficiency of the J-PAKE protocol, and a number of evaluations are given as a summary.