End-to-end authenticated key exchange agreement for wearable devices in IoT environments

Author(s):  
Chien-Lung Hsu ◽  
Tzu-Hsien Chuang ◽  
Tzu-Wei Lin
2021 ◽  
Vol 24 (3) ◽  
pp. 1-37
Author(s):  
Stanislaw Jarecki ◽  
Mohammed Jubur ◽  
Hugo Krawczyk ◽  
Nitesh Saxena ◽  
Maliheh Shirvanian

We present a secure two-factor authentication (TFA) scheme based on the user’s possession of a password and a crypto-capable device. Security is “end-to-end” in the sense that the attacker can attack all parts of the system, including all communication links and any subset of parties (servers, devices, client terminals), can learn users’ passwords, and perform active and passive attacks, online and offline. In all cases the scheme provides the highest attainable security bounds given the set of compromised components. Our solution builds a TFA scheme using any Device-enhanced Password-authenticated Key Exchange (PAKE), defined by Jarecki et al., and any Short Authenticated String (SAS) Message Authentication, defined by Vaudenay. We show an efficient instantiation of this modular construction, which utilizes any password-based client-server authentication method, with or without reliance on public-key infrastructure. The security of the proposed scheme is proven in a formal model that we formulate as an extension of the traditional PAKE model. We also report on a prototype implementation of our schemes, including TLS-based and PKI-free variants, as well as several instantiations of the SAS mechanism, all demonstrating the practicality of our approach. Finally, we present a usability study evaluating the viability of our protocol contrasted with the traditional PIN-based TFA approach in terms of efficiency, potential for errors, user experience, and security perception of the underlying manual process. 1


The key trade procedure is well thought-out significant fractions of cryptographic method towards defend protected end-to-end communications. All existing techniques need two servers to be active to authenticate but this technique can authenticate even one server is up and other server is down due to attack as active server authenticate user by taking his parts. In this paper, design an idea Password-authenticated key exchange (PAKE) method to verify clients by utilizing two servers, first client secret phrase will be splitted into two sections and afterward mystery key will be produced for each part and after that by utilizing key and splitted secret phrase will be encoded utilizing Elgamal Encryption. Each encoded part and key will be send to every server. Every server will have its very own key and in the event that aggressor traded off one server, at that point he won't ready to login till he got client information of second server, by utilizing this strategy no assailant can bargain the two servers.


2011 ◽  
Vol 34 (1) ◽  
pp. 38-46 ◽  
Author(s):  
Fu-Shan WEI ◽  
Chuan-Gui MA ◽  
Qing-Feng CHENG

Sign in / Sign up

Export Citation Format

Share Document