Public-key cryptography and password protocols
- 1 August 1999
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Information and System Security
- Vol. 2 (3), 230-268
- https://doi.org/10.1145/322510.322514
Abstract
We study protocols for strong authentication and key exchange in asymmetric scenarios where the authentication server possesses ~a pair of private and public keys while the client has only a weak human-memorizable password as its authentication key. We present and analyze several simple password authentication protocols in this scenario, and show that the security of these protocols can be formally proven based on standard cryptographic assumptions. Remarkably, our analysis shows optimal resistance to off-line password guessing attacks under the choice of suitable public key encryption functions. In addition to user authentication, we describe ways to enhance these protocols to provide two-way authentication, authenticated key exchange, defense against server's compromise, and user anonymity. We complement these results with a proof that strongly indicates that public key techniques are unavoidable for password protocols that resist off-line guessing attacks. As a further contribution, we introduce the notion of public passwords that enables the use of the above protocols in situations where the client's machine does not have the means to validate the server's public key. Public passwords serve as "hand-held certificates" that the user can carry without the need for specal computing devices.Keywords
This publication has 14 references indexed in Scilit:
- Secure applications of low-entropy keysPublished by Springer Nature ,1998
- Strong password-only authenticated key exchangeACM SIGCOMM Computer Communication Review, 1996
- Refinement and extension of encrypted key exchangeACM SIGOPS Operating Systems Review, 1995
- The S/KEY One-Time Password SystemPublished by RFC Editor ,1995
- Augmented encrypted key exchangePublished by Association for Computing Machinery (ACM) ,1993
- Authentication and authenticated key exchangesDesigns, Codes and Cryptography, 1992
- How to construct random functionsJournal of the ACM, 1986
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- Password authentication with insecure communicationCommunications of the ACM, 1981