Skip to main content
Top

2016 | OriginalPaper | Chapter

The Password Authenticated Connection Establishment Protocol (PACE) Based on Imaginary Quadratic Fields

Authors : Taoufik Serraj, Soufiane Mezroui, Moulay Chrif Ismaili, Abdelmalek Azizi

Published in: Proceedings of the Mediterranean Conference on Information & Communication Technologies 2015

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Using Buchmann-Williams protocol and relying on the intractability of the discrete logarithm problem in the class group of an imaginary quadratic field, we introduce a new version of Password Authenticated Connection Establishment protocol. This construction (IQF-PACE) can be proved secure in Bellare Pointcheval Rogaway (BPR) model, and provides a variant of the actually elliptic curve instantiation of the PACE protocol to avoid some side channel attacks, particularly, Fault Analysis Attacks (FAAs).

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bellovin, S.M., Merritt, M.: Encrypted key exchange: Password-based protocols secure against dictionary attacks. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 72–84. IEEE, Oakland (1992) Bellovin, S.M., Merritt, M.: Encrypted key exchange: Password-based protocols secure against dictionary attacks. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 72–84. IEEE, Oakland (1992)
3.
go back to reference Gennaro, R.: Faster and shorter password-authenticated key exchange. In: Canetti, R. (ed.) Theory of Cryptography 2008. LNCS, vol. 4948, pp. 589–606. Springer, Heidelberg (2008) Gennaro, R.: Faster and shorter password-authenticated key exchange. In: Canetti, R. (ed.) Theory of Cryptography 2008. LNCS, vol. 4948, pp. 589–606. Springer, Heidelberg (2008)
4.
go back to reference Mezroui, S., Azizi, A., Ziane, M.: A key exchange system based on some bicyclic biquadratic number fields. In: International Conference on Multimedia Computing and Systems (ICMCS), pp. 1260–1264. IEEE Xplore, Marrakech (2014) Mezroui, S., Azizi, A., Ziane, M.: A key exchange system based on some bicyclic biquadratic number fields. In: International Conference on Multimedia Computing and Systems (ICMCS), pp. 1260–1264. IEEE Xplore, Marrakech (2014)
5.
go back to reference Federal Office for Information Security (BSI).: Advanced security mechanism for machine readable travel documents extended access control (EAC). Technical report, (BSI-TR-03110) Version 2.05 (2010) Federal Office for Information Security (BSI).: Advanced security mechanism for machine readable travel documents extended access control (EAC). Technical report, (BSI-TR-03110) Version 2.05 (2010)
6.
go back to reference Federal Office for Information Security (BSI).: Advanced security mechanisms for machine readable travel documents and eIDAS token. Technical report, (BSI-TR-03110) Version 2.20 (2015) Federal Office for Information Security (BSI).: Advanced security mechanisms for machine readable travel documents and eIDAS token. Technical report, (BSI-TR-03110) Version 2.20 (2015)
7.
go back to reference ISO/IEC JTC1 SC17 WG3/TF5 for the International Civil Aviation Organization.: Supplemental access control for machine readable travel documents. Technical report (2010) ISO/IEC JTC1 SC17 WG3/TF5 for the International Civil Aviation Organization.: Supplemental access control for machine readable travel documents. Technical report (2010)
8.
go back to reference Biasse, J.F., Jacobson Jr, M.J., Silvester, A.K.: Security estimates for quadratic field based cryptosystems. In: Steinfeld, R., Hawkes, P. (eds.) Information Security and Privacy 2010. LNCS, vol. 6168, pp. 233–247. Springer, Heidelberg (2010)CrossRef Biasse, J.F., Jacobson Jr, M.J., Silvester, A.K.: Security estimates for quadratic field based cryptosystems. In: Steinfeld, R., Hawkes, P. (eds.) Information Security and Privacy 2010. LNCS, vol. 6168, pp. 233–247. Springer, Heidelberg (2010)CrossRef
9.
go back to reference Hamdy, S., Moller, B.: Security of cryptosystems based on class groups of imaginary quadratic orders. In: Okamoto, T. (ed.) Advances in Cryptology ASIACRYPT 2000. LNCS, vol. 1976, pp. 234–247. Springer, Heidelberg (2000)CrossRef Hamdy, S., Moller, B.: Security of cryptosystems based on class groups of imaginary quadratic orders. In: Okamoto, T. (ed.) Advances in Cryptology ASIACRYPT 2000. LNCS, vol. 1976, pp. 234–247. Springer, Heidelberg (2000)CrossRef
10.
go back to reference Bender, J., Fischlin, M., Kugler, D.: Security analysis of the PACE key-agreement protocol. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) Information Security 2009. LNCS, vol. 5735, pp. 33–48. Springer, Heidelberg (2009) Bender, J., Fischlin, M., Kugler, D.: Security analysis of the PACE key-agreement protocol. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) Information Security 2009. LNCS, vol. 5735, pp. 33–48. Springer, Heidelberg (2009)
11.
go back to reference Abdalla, M., Fouque, P.A., Pointcheval, D.: Password-based authenticated key exchange in the three-party setting. In: Vaudenay, S. (ed.) Public Key Cryptography—PKC 2005. LNCS, vol. 3386, pp. 65–84. Springer, Heidelberg (2005)CrossRef Abdalla, M., Fouque, P.A., Pointcheval, D.: Password-based authenticated key exchange in the three-party setting. In: Vaudenay, S. (ed.) Public Key Cryptography—PKC 2005. LNCS, vol. 3386, pp. 65–84. Springer, Heidelberg (2005)CrossRef
12.
go back to reference Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of eliminating errors in cryptographic computations. J. Cryptol. 14, 101–119 (2001)MathSciNetCrossRefMATH Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of eliminating errors in cryptographic computations. J. Cryptol. 14, 101–119 (2001)MathSciNetCrossRefMATH
13.
go back to reference Biehl, I., Meyer, B., Muller, V.: Differential fault attacks on elliptic curve cryptosystems. In: Bellare, M. (ed.) Advances in Cryptology CRYPTO 2000. LNCS, vol. 1880, pp. 131–146. Springer, Heidelberg (2000)CrossRef Biehl, I., Meyer, B., Muller, V.: Differential fault attacks on elliptic curve cryptosystems. In: Bellare, M. (ed.) Advances in Cryptology CRYPTO 2000. LNCS, vol. 1880, pp. 131–146. Springer, Heidelberg (2000)CrossRef
14.
go back to reference Piret, G., Quisquater, J.J.: A differential fault attack technique against SPN structures, with application to the AES and Khazad. In: Walter, C.D., Koc, C.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems—CHES 2003. LNCS, vol. 2779, pp. 77–88. Springer, Heidelberg (2003)CrossRef Piret, G., Quisquater, J.J.: A differential fault attack technique against SPN structures, with application to the AES and Khazad. In: Walter, C.D., Koc, C.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems—CHES 2003. LNCS, vol. 2779, pp. 77–88. Springer, Heidelberg (2003)CrossRef
15.
go back to reference Tunstall, M., Mukhopadhyay, D., Ali, S.: Differential fault analysis of the advanced encryption standard using a single fault. In: Ardagna, C.A., Zhou, J. (eds.) Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication 2011. LNCS, vol. 6633, pp. 224–233. Springer, Heidelberg (2011) Tunstall, M., Mukhopadhyay, D., Ali, S.: Differential fault analysis of the advanced encryption standard using a single fault. In: Ardagna, C.A., Zhou, J. (eds.) Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication 2011. LNCS, vol. 6633, pp. 224–233. Springer, Heidelberg (2011)
Metadata
Title
The Password Authenticated Connection Establishment Protocol (PACE) Based on Imaginary Quadratic Fields
Authors
Taoufik Serraj
Soufiane Mezroui
Moulay Chrif Ismaili
Abdelmalek Azizi
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-30301-7_39