A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 4)Publication Date: 2015-04-05
Authors : Shivani Bhatia; Rekha Saraswat;
Page : 1415-1419
Keywords : key-exchange; authentication; password; three-party;
Abstract
Cryptographic protocols for key exchange have an aim of secure exchange of secret keys over the public network. Password based authenticated key exchange (PAKE) protocols are popularly used for communication purposes due to their convenience. As the name suggests, it involves sharing of a human-memorable password by each entity with a trusted third party. Three party PAKE (3-PAKE) protocols allow two parties to authenticate each other via the trusted third party and establish a session key between them for further communication. Various 3-PAKE protocols have been proposed over the years, each having its own weaknesses and strengths. This paper presents a review of few such 3-PAKE protocols and gives suggestions for future enhancements.
Other Latest Articles
- Effect of Supplementation of Soy Flour on Rice Fryums Quality
- Development and Evaluation of Banana Blossom Incorporated Dark Chocolate
- Experimental Analysis on Performance of a Counter Flow Tray Type Cooling Tower
- Development the Prototype of Merry Go Round Pump
- Thermo-Mechanical Analysis in TIG Welding of Aluminium Alloy 6082
Last modified: 2021-06-30 21:44:39