Forward secrecy in password-only key exchange protocols

TitleForward secrecy in password-only key exchange protocols
Publication TypeConference Papers
Year of Publication2003
AuthorsKatz J, Ostrovsky R, Yung M
Conference NameProceedings of the 3rd international conference on Security in communication networks
Date Published2003///
PublisherSpringer-Verlag
Conference LocationBerlin, Heidelberg
ISBN Number3-540-00420-3
Abstract

Password-only authenticated key exchange (PAKE) protocols are designed to be secure even when users choose short, easily-guessed passwords. Security requires, in particular, that the protocol cannot be broken by an off-line dictionary attack in which an adversary enumerates all possible passwords in an attempt to determine the correct one based on previously-viewed transcripts. Recently, provably-secure protocols for PAKE were given in the idealized random oracle/ideal cipher models [2,8,19] and in the standard model based on general assumptions [11] or the DDH assumption [14]. The latter protocol (the KOY protocol) is currently the only known practical solution based on standard assumptions. However, only a proof of basic security for this protocol has appeared. In the basic setting the adversary is assumed not to corrupt clients (thereby learning their passwords) or servers (thereby modifying the value of stored passwords). Simplifying and unifying previous work, we present a natural definition of security which incorporates the more challenging requirement of forward secrecy. We then demonstrate via an explicit attack that the KOY protocol as originally presented is not secure under this definition. This provides the first natural example showing that forward secrecy is a strictly stronger requirement for PAKE protocols. Finally, we present a slight modification of the KOY protocol which prevents the attack and - as the main technical contribution of this paper - rigorously prove that the modified protocol achieves forward secrecy.

URLhttp://dl.acm.org/citation.cfm?id=1766811.1766816