International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords

Authors:
Junghyun Nam
Seungjoo Kim
Dongho Won
Download:
URL: http://eprint.iacr.org/2004/348
Search ePrint
Search Google
Abstract: Recently, Sun, Chen and Hwang [J. Syst. Software, 75 (2005), 63-68] have proposed two new three-party protocols, one for password-based authenticated key agreement and one for verifier-based authenticated key agreement. In this paper, we show that both of Sun-Chen-Hwang's protocols are insecure against an active adversary who can intercept messages, start multiple sessions of a protocol, or otherwise control the communication in the network. Also, we present a simple solution to the security problem with the protocols.
BibTeX
@misc{eprint-2004-12311,
  title={A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords},
  booktitle={IACR Eprint archive},
  keywords={cryptographic protocols / Three-party key agreement; Password; Verifier; Active adversary},
  url={http://eprint.iacr.org/2004/348},
  note={ jhnam@dosan.skku.ac.kr 12766 received 7 Dec 2004, last revised 13 Dec 2004},
  author={Junghyun Nam and Seungjoo Kim and Dongho Won},
  year=2004
}