CryptoDB

Paper: Key Exchange Using Passwords and Long Keys

Authors: Vladimir Kolesnikov Charles Rackoff URL: http://eprint.iacr.org/2006/057 Search ePrint Search Google We propose a new model for key exchange (KE) based on a combination of different types of keys. In our setting, servers exchange keys with clients, who memorize short passwords and carry (stealable) storage cards containing long (cryptographic) keys. Our setting is a generalization of that of Halevi and Krawczyk \cite{HaleviKr99} (HK), where clients have a password and the public key of the server. We point out a subtle flaw in the protocols of HK and demonstrate a practical attack on them, resulting in a full password compromise. We give a definition of security of KE in our (and thus also in the HK) setting and discuss many related subtleties. We define and discuss protection against denial of access (DoA) attacks, which is not possible in any of the previous KE models that use passwords. Finally, we give a very simple and efficient protocol satisfying all our requirements.
BibTeX
@misc{eprint-2006-21550,
title={Key Exchange Using Passwords and Long Keys},
booktitle={IACR Eprint archive},
keywords={foundations / password-based key exchange, hybrid model, long key},
url={http://eprint.iacr.org/2006/057},
note={Theory of Cryptography Conference 2006 vlad@cs.utoronto.ca 13202 received 14 Feb 2006, last revised 23 Feb 2006},