Cryptology ePrint Archive: Report 2015/1099

Device-Enhanced Password Protocols with Optimal Online-Offline Protection

Stanislaw Jarecki and Hugo Krawczyk and Maliheh Shirvanian and Nitesh Saxena

Abstract: We introduce a setting that we call Device-Enhanced PAKE (DE-PAKE), where PAKE (password-authenticated key exchange) protocols are strengthened against online and offline attacks through the use of an auxiliary device that aids the user in the authentication process. We build such schemes and show that their security, properly formalized, achieves maximal-attainable resistance to online and offline attacks in both PKI and PKI-free settings. In particular, an online attacker must guess the user's password and also corrupt the user's auxiliary device to authenticate, while an attacker who corrupts the server cannot learn the users' passwords via an offline dictionary attack. Our solutions do not require secure channels, and nothing (in an information-theoretic sense) is learned about the password by the device (or a malicious software running on the device) or over the device-client channel, even without any external protection of this channel. An attacker taking over the device still requires a full online attack to impersonate the user. Importantly, our DE-PAKE scheme can be deployed at the user end without the need to modify the server and without the server having to be aware that the user is using a DE-PAKE scheme. In particular, the schemes can work with standard servers running the usual password-over-TLS authentication.

Category / Keywords: cryptographic protocols / passwords, PAKE, authentication

Original Publication (with minor differences): ACM Asia Conference on Computer and Communications Security (CCS), Xi'an, China, May 30-Jun 3, 2016.

Date: received 12 Nov 2015, last revised 29 Mar 2017

Contact author: hugo at ee technion ac il

Available format(s): PDF | BibTeX Citation

Note: Revision of terminology related to KCI resistance, some additional explanations, and other minor improvements.

Version: 20170330:013031 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]