Prevention of exponential equivalence in simple password exponential key exchange (SPEKE) (Q2406235)
From MaRDI portal
scientific article
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Prevention of exponential equivalence in simple password exponential key exchange (SPEKE) |
scientific article |
Statements
Prevention of exponential equivalence in simple password exponential key exchange (SPEKE) (English)
0 references
27 September 2017
0 references
Summary: Simple Password Exponential Key Exchange (SPEKE) and Dragonfly are simple password-based authenticated key exchange protocols that use a value derived from a shared password as a generator for modular exponentiation, as opposed to Diffie-Hellman key exchange, which uses a fixed value. However, it has been shown that in SPEKE, an active attacker, can examine multiple passwords in a single attempt because the passwords have an exponential correlation. We show that Dragonfly can also suffer from the same problem, and we propose a simple countermeasure to prevent the exponential equivalence in SPEKE.
0 references
exponential equivalence
0 references
password authentication
0 references
key exchange
0 references
SPEKE
0 references
dragonfly
0 references