KSRP: Improved Secure Remote Password Protocol Based on Post Quantum Algorithm

Author:

YANG Yatao1,ZHAO Ruoyan1,DONG Hui1,HUANG Jierun1

Affiliation:

1. Beijing Electronic Science and Technology Institute

Abstract

Abstract In order to solve the issue that traditional secure remote password (SRP) protocols cannot resist the active quantum computing attack, a simple and efficient SRP protocol based on post quantum algorithm Kyber named KSRP is proposed. In the protocol, the asymmetrical key consensus algorithm (AKCN) and post quantum algorithm are used to implement authenticated key exchange. This scheme can resist password recovery, Denning-Sacco’s attack and other attacks after being analyzed, which satisfies provable security under eCK model and indistinguishable game model. Compared with the traditional password authenticated key exchange (PAKE) protocols based on classical hard mathematical problems, this protocol refers to the generation method on the temporary public key and private key in the post quantum public key encryption algorithm Kyber, which enhances the security of process parameters. In addition, the scheme uses compression functions for the transmitted session public key to reduce communication overhead and improve security. After being tested in the LWE tester tool SageMathCell, the security of this protocol can reach 313 bits, which is 2.79 times the traditional SRP protocol, and 3.91 times J-PAKE protocol, also is higher 70.1% than Ding’s RLWE-PAK and RLWE-PPK protocols. The communication overhead in the protocol is only higher about 16% of post-quantum PPK and PAK protocols. This protocol is simple, efficient, and resistant to quantum computing active attacks, which can be applied in remote authenticated key exchange in cloud networks.

Publisher

Research Square Platform LLC

Reference49 articles.

1. Peikert C (2014) Lattice cryptography for the Internet[C]. In: 6th International Workshop on Post-Quantum Cryptography (PQCrypto 2014). LNCS, vol 8772, Springer, Cham, : 197–219

2. RAKA: New Authenticated Key Agreement Protocol Based on Ring-LWE[J];Yang Yatao Z;J Comput Res Dev,2017

3. Bidirectional authenticated key agreement protocol supporting identity’s privacy preservation based on RLWE[J];Yang YT;J Commun,2019

4. Alkim E, Ducas L, PoppelmannT et al (2016) NewHope without reconciliation[J]. IACR Cryptology ePrint Archive, 2016, 1157: 20171109:073050

5. Katz J, Vaikuntanathan V (2009) Smooth projective hashing and password-based authenticated key exchange from lattices[C]. In: 15th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2009). LNCS, vol 5912, Springer, Berlin, Heidelberg, : 636–652

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3