2013 | OriginalPaper | Chapter
On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange Protocol
Authors : Youngsook Lee, Dongho Won
Published in: Grid and Pervasive Computing
Publisher: Springer Berlin Heidelberg
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
This paper is concerned with the security of a three-party password-authenticated key exchange protocol presented by Abdalla and Pointcheval in FC’05. Abdalla and Pointcheval’s protocol makes use of a hash function
F
whose outputs are elements of a cyclic group G of prime order. Such a hash function
F
can be constructed from a typical hash function in various ways. In this paper, we consider the case that
F
(.) =
g
h
(.)
, where
g
is an arbitrary generator of G and
h
is a hash function such as SHA-1 and MD5. Our result is that such a construction of
F
immediately leads to the vulnerability of the Abdalla-Pointcheval protocol to an off-line dictionary attack. We also show how to address this weakness of the protocol.