Password-authenticated key agreement
In cryptography, a password-authenticated key agreement method is an interactive method for two or more parties to establish cryptographic keys based on one or more party's knowledge of a password.
Password-authenticated key agreement generally encompasses methods such as:
- Balanced password-authenticated key exchange
- Augmented password-authenticated key exchange
- Password-authenticated key retrieval
- Multi-server methods
- Multi-party methods
In the most stringent password-only security models, there is no requirement for the user of the method to remember any secret or public data other than the password.
Password authenticated key exchange (PAKE) is where two or more parties, based only on their knowledge of a password, establish a cryptographic key using an exchange of messages, such that an unauthorized party (one who controls the communication channel but does not possess the password) cannot participate in the method and is constrained as much as possible from guessing the password. (The optimal case yields exactly one guess per run exchange.) Two forms of PAKE are Balanced and Augmented methods.
Balanced PAKE allows parties that use the same password to negotiate and authenticate a shared key. Examples of these are:
- Encrypted Key Exchange (EKE)
- PAK and PPK
- SPEKE (Simple password exponential key exchange)
Augmented PAKE is a variation applicable to client/server scenarios, in which an attacker must perform a successful brute-force attack in order to masquerade as the client using stolen server data. Examples of these are:
- AMP
- Augmented-EKE
- B-SPEKE
- PAK-Z
- SRP-3 (Secure remote password protocol)
Password-authenticated key retrieval is a process in which a client obtains a static key in a password-based negotiation with a server that knows data associated with the password, such as the Ford and Kaliski methods. In the most stringent setting, one party uses only a password in conjunction with two or more (N) servers to retrieve a static key, in a way that protects the password (and key) even if any N-1 of the servers are completely compromised.
Brief history
The first successful password-authenticated key agreement methods were Encrypted Key Exchange methods described by Steven M. Bellovin and Michael Merritt in 1992. Although several of the first methods were flawed, the surviving and enhanced forms of EKE effectively amplify a shared password into a shared key, which can then be used for encryption and/or message authentication.
The first provably-secure PAKE protocols were given in work by M. Bellare, D. Pointcheval, and P. Rogaway (Eurocrypt 2000) and Boyko, MacKenzie, and Patel (Eurocrypt 2000). These protocols were proven secure in the so-called random oracle model (or even stronger variants), and the first protocols proven secure under standard assumptions were those of Goldreich and Lindell (Crypto 2001) and Katz, Ostrovsky, and Yung (Eurocrypt 2001).
The first password-authenticated key retrieval methods were described by Ford and Kaliski in 2000.
A considerable number of refinements, alternatives, variations, and security proofs have been proposed in this growing class of password-authenticated key agreement methods. Current standardization efforts for these methods include IETF RFC 2945, IEEE P1363.2, and ISO-IEC 11770-4:2006.
References
- M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated Key Exchange Secure against Dictionary Attacks. Advances in Cryptology -- Eurocrypt 2000, LNCS vol. 1807, Springer-Verlag, 2000.
- S. M. Bellovin and M. Merritt. Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks. Proceedings of the I.E.E.E. Symposium on Research in Security and Privacy, Oakland, May 1992.
- V. Boyko, P. MacKenzie, and S. Patel. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. Advances in Cryptology -- Eurocrypt 2000, LNCS vol. 1807, Springer-Verlag, 2000.
- W. Ford & B. Kaliski. Server-Assisted Generation of a Strong Secret from a Password. Proceedings of the IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, NIST, Gaithersburg MD, June 14-16, 2000.
- O. Goldreich and Y. Lindell. Session-Key Generation Using Human Passwords Only. Advances in Cryptology -- Crypto 2001, LNCS vol. 2139, Springer-Verlag, 2001.
- IEEE P1363.2: Proposed Standard for Password-Based Public-Key Cryptography. IEEE P1363 Working Group.
- J. Katz, R. Ostrovsky, and M. Yung. Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords. Advances in Cryptology -- Eurocrypt 2001, LNCS vol. 2045, Springer-Vergal, 2001.
- T. Wu. The SRP-3 Secure Remote Password Protocol. IETF RFC 2945.
- ISO/IEC 11770-4:2006 Information technology -- Security techniques -- Key management -- Part 4: Mechanisms based on weak secrets.