Abstract
In this paper, we cryptanalyze the recent smart card based client-to-client password-authenticated key agreement (C2C-PAKA-SC) protocol for cross-realm settings proposed at CANS '09. While client-to-client password-authenticated key exchange (C2C-PAKE) protocols exist in literature, what is interesting about this one is that it is the only such protocol claimed to offer security against password compromise impersonation without depending on public-key cryptography, and is one of the few C2C-PAKE protocols with provable security that has not been cryptanalyzed. We present three impersonation attacks on this protocol; the first two are easier to mount than the designer-considered password compromise impersonation. Our results are the first known cryptanalysis results on C2C-PAKA-SC.
Original language | English |
---|---|
Title of host publication | Cryptology and Network Security - 10th International Conference, CANS 2011, Proceedings |
Pages | 172-184 |
Number of pages | 13 |
DOIs | |
Publication status | Published - 2011 |
Externally published | Yes |
Event | International Conference on Cryptology and Network Security 2011 - Sanya, China Duration: 10 Dec 2011 → 12 Dec 2011 Conference number: 10th https://link.springer.com/book/10.1007/978-3-642-25513-7 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 7092 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | International Conference on Cryptology and Network Security 2011 |
---|---|
Abbreviated title | CANS 2011 |
Country/Territory | China |
City | Sanya |
Period | 10/12/11 → 12/12/11 |
Internet address |
Keywords
- attack
- Client-to-client
- cross realm
- impersonation
- password-authenticated key agreement