|
This article is cited in 4 scientific papers (total in 4 papers)
A review of the password authenticated key exchange protocols vulnerabilities and principles of the SESPAKE protocol construction
E. K. Alekseev, L. R. Akhmetzyanova, I. B. Oshkin, S. V. Smyshlyaev CryptoPro LLC, Moscow
Abstract:
We consider a family of protocols permitting the parties sharing a weak key (a password) to generate a strong common key using the unprotected channel. It is supposed that to check the password correctness the adversary should interact with legitimate participants. A review of the known vulnerabilities of the protocols of the family considered is given. This review is used to explain the main principles of the SESPAKE protocol construction.
Key words:
protocols, SESPAKE, PAKE, key exchange, authentication, password.
Received 23.VI.2016
Citation:
E. K. Alekseev, L. R. Akhmetzyanova, I. B. Oshkin, S. V. Smyshlyaev, “A review of the password authenticated key exchange protocols vulnerabilities and principles of the SESPAKE protocol construction”, Mat. Vopr. Kriptogr., 7:4 (2016), 7–28
Linking options:
https://www.mathnet.ru/eng/mvk201https://doi.org/10.4213/mvk201 https://www.mathnet.ru/eng/mvk/v7/i4/p7
|
Statistics & downloads: |
Abstract page: | 792 | Full-text PDF : | 634 | References: | 61 | First page: | 7 |
|