Abstract: In emerging technological world, security potentially remains as a highest challenge in the large-scale distributed systems, as it is suffering extensively with adversaria! attacks due to insufficient mutual authentication. In order to address this, a state-of-art tetrahedron (3D) based two-server Password Authenticated and Key Exchange (PAKE) protocol has been formulated with formal proof of security by incorporating the elementary properties of plañe geometry. The main intention of this work is, obtaining a password from the stored credentials must be infeasible when both the servers compromised together. At the outset to realize these goals, in this paper, the properties of the tetrahedron are utilized along with Diffie-Hellman (DH) key exchange algorithm to withstand against malicious attacks. A significant aspect of the proposed 3D PAKE protocol is, client side complexity has been reduced to a greater extent in terms of computation and communication. Both theoretically and practically, 3D PAKE protocol is the first demonstrable secure two-server PAKE protocol that breaks the assumptions of the Yang et al. and Yi et al. protocol that the two servers must not compromise together. Computational complexity, communication complexity, security key principies, best of all attacks happening dubiously are considered as the evaluation parameters to compare the performance of the proposed 3D PAKE protocol.
Keywords: 3D PAKE protocol, tetrahedron property analysis, Diffie-Hellman key exchange.
Articles
An efficient 3D Diffie-Hellman based Two-Server password-only authenticated key exchange
In this digital world, web services are accessed by the users consistently. Yet, these web services are suffering with poor authentication that in turn allows malicious users to impersonate the services. Thereby, framing an effective solution to reduce the attack surface is inevitable. Most of the web services rely upon digital certifícate for verification. On the contrary, when the certifícate authority is vulnerable to hazardous attacks or security breaches, the primary effect includes compromising of numerous certificates (Dennis, 2012). An optimal and effectual solution to address this issue is PAKE protocol. PAKE establishes a secret key between two communicating parties based upon the knowledge of sensitive information like, low-entropy password (Bellovin & Merritt, 1992). Relatively, password based authentication techniques is a flexible one to reduce the intricacies to a greater extent without demanding abundant space or device requirement. It is considered as one of the simplest and most convenient authentication mechanisms. In PAKE, an attacker or man-in-the-middle will not be able to guess a password without further interactions with communicating parties. This defensive property acts as a phenomenal aspect of PAKE. In most of the cases, the single server model is liable to invasive attacks, whereas the multi - server model is expensive and entails high communication bandwidth. With that note, two-server model is considered as a wise choice. 3D protocol assures that determining the key/obtaining a password from the stored information is impossible by the adversaries.
Mathematical research normally simplifies a complex problem in all academic disciplines. Using geometrical properties in a PAKE protocol is an appealing technique, as this plays an extensive role in real life from the most basic to the advanced part. An amazing fact is retrieving the original source from these properties is infeasible (Jack, 2008).The security model of the proposed protocol is based on the properties - circumcenter (ꞷ) and the angle between the medians (θ) of tetrahedron to protect the system against attacks. It is a proven fact, that the properties of a tetrahedron are undoubtedly more difficult to visualize and break (Choate, 1976). A profound analysis of the protocol acts as an evidence for the protocol's resistance against the attacks.
Introduction section addresses the motivation of choosing trigonometric properties in 3D PAKE protocol. Section 2 explores the related literature, section 3 elaborates the proposed methodology, section 4 converses the protocols' correctness and security analysis theoretically, section 5 carries out performance analysis and the section 6 presents the summary of the key contributions of 3D PAKE and possible research avenues.
In web services, Kerberos based framework generates tickets for binary authentication. One of the major limitations of Kerberos is that, it is vulnerable to password guessing attacks (Bellovin & Merritt, 1990). Further, Kerberos requires a trusted path to handle passwords and does not support multipart authentication. The flaws can be inherently resolved by using a formal PAKE protocol.
Initially a pioneering symmetric two-server PAKE is proposed by Katz, MacKenzie, Taban, and Gligor (2005). Computation and communication complexity is the highest barrier in adopting Katz protocol. Three-party encrypted key exchange scheme proposed by Lin, Sun, and Hwang (2000) is stringent against attacks; however, as a prerequisite, the client needs to obtain and verify the the public key of the server. Similarly, computational complexity is the limitation of the nPAKE+ scheme (Wan, Deng, Bao, & Preneel, 2007). A Gateway based Threshold Password-based Authenticated Key Exchange (GTPAKE) scheme is susceptible to undetectable on-line password guessing attack by a malicious gateway (Byun. Lee, & Lim, 2006; Chien, Wu, & Yeh, 2013). A threshold PAKE verifies the client based on the threshold valué (Abdalla, Chevassut, & Fouque, 2005; Mackenzie. Shrimpton, & Jakobsson, 2002). Even though, the protocol is secure against dictionary attacks, fixing the acceptable threshold valué is a complicated process. 3D password authentication system constituting of recognition, recall, tokens and biometrics as a single authentication system is proposed by Pooja, Shilpi, Sujata, & Vinita, (2012). Device requirement is a limitation of this approach. An efficient password based two-server authentication and pre-shared key exchange system using smart card is proposed by Chouksey & Pandey (2013). It is an ID-based remote user authentication protocol with a smart card that uses simple bitwise XOR operations and hash functions. Device requirement is the main shortcoming of this approach. Yang, Deng, and Bao (2006) proposed the practical two-server PAKE model. It is not robust against dictionary attacks caused by the active adversary and it is possible to compute the session key established between the User (U) and Service Server (SS).presented a two-server authentication and key exchange protocol that uses múltiple SS with a single Control Server (CS). This protocol is not efficient when compared with Yang et al. (2006) protocol in terms of computational cost. An enhancement of Yang et al. (2006) scheme is proposed byas Password-only Two-Server Authenticated Key Exchange (PTAKE) to remain secure against offline dictionary attack. Yet the formal security model has not been devised for PTAKE. An efficient two-server PAKE proposed by Yi, Ling, and Wang (2013) is a symmetric two-server PAKE protocol that performs the operations in parallel at both the servers. However, for transferring messages it relies upon a gateway that is expensive and entails high communication complexity. Also, Yi et al. (2013) model reveáis the credentials when both the servers compromised. As a nutshell, all existing two-server protocols disclose the information when both the servers are compromised by the intruder. Further, device requirement is a major concern in some of the protocols.
Kumari, Sadasivarn, and Akash (2016) proposed a 3D ECC PAKE protocol by employing the virtues of plañe geometry with ECC encryption technique to offer strong security against server spoofing attacks. Proposed protocol provides equivalent security analogous to Kumari et al. protocol where the strength is based upon the Decisional Diffie-Hellman (DDH) discrete logarithm technique and is proven to be secure. 3D PAKE protocol has been tested for a healthcare application (Kumari, Sadasivarn, & Rohini, 2016) and can be applied to similar E-medical applications (Rajan, 2015). Table 1 summarizes the merits and demerits of conventional two-server PAKE protocols.
3D PAKE protocol is coined based on tetrahedron properties and Diffie-Hellman key exchange mechanism. Existing two-server PAKE protocols assume that both the servers must not compromise together to protect the credentials against invasive attacks. The thought provoking process behind the 3D PAKE is to break the assumption and to offend offline dictionary attacks and assumption and to offend offline dictionary attacks and impersonation attacks caused by an inside/outside adversary. Yang et al. (2006) is modified in the proposed 3D PAKE, to avoid the impersonation of back-end server S2 as front-end server SI in obtaining the key and the password. The advantages of the proposed methodology are illustrated by considering communication complexity, computational complexity as the metrics. Diffie-Hellman key exchange algorithm process is explained below:
DH relies on the assumption that no efficient algorithm exists to ascertain the valúes of 'a', 'b' from gab, if 'a', 'b' and 'g' are chosen randomly and independently (Boneh, 1998). Mínimum length of prime number recommended for DH key exchange is 1024-bits to prevent the incidence of any harmful attacks. DH algorithm is secure against passive adversary's attacks. It is not possible by a passive adversary to obtain the secret key based on the observation of data exchanged between userl and user2. On the other hand, the active attack is possible in DH key exchange as it is a non-authenticated key exchange protocol. To avoid active attacks, the DH key agreement must be put into practice along with strong authentication mechanisms. PAKE protocol is found to be secure against man-in-the-middle attack using low entropy passwords. Thus, the proposed research work is framed with the aid of a PAKE protocol with DH mechanism. Incorporating trigonometric properties further enhance the security of the DH PAKE protocol in fighting against the incidence of all possible active attacks.
The 3D PAKE protocol is unconditionally secure, as the password cannot be obtained when both the servers compromise together. Entities used in the 3D PAKE protocol are client C, server SI and server S2. The protocol executes in three phases, namely, initialization, registration, authentication and key exchange. The notations used in the 3D PAKE protocol are:
In the initialization phase, the public parameters {Zp*,p,g1,g2,g3Hash} are accepted and disseminated collaboratively by the entities client C, server SI and S2.
Security of the protocol is based on the generators, prime order and the hash function. The impressive ability is the randomness of the hash function and the generator's discrete logarithm problem. g4 is a valué known only to SI to avoid man-in-the-middle and client impersonation attacks.
The client C selects a password P and compute . Further, the client computes and forwards the authentication information { } to server SI. The server SI build a tetrahedron from by splitting the valué into x1,x2,x3,y1,y2,y3,z1,z2,z3 where g4 is a value known to S1 to avoid impersonation attack. SI calculate the angle between the medians (ϑ) and circumcenter (ω). Further, it stores ϑ as along with b3 and transmit username , b4 to the server S2. S2 receives and store , along with b4. As a result, registration of client with server SI and S2 is successful. The operations involved in the registration phase are clearly illustrated in Figure 1.
The user induces the verification by sending the username and to the server SI, where 'P' is clients' password. Server SI constructs the tetrahedron from and ascertains angle between the medians (θ) and circumcenter (ω). The calculated angle between the medians is verified with the stored Further, SI forwards the request message {Username, } to the server S2.
Upon receiving the message, the server S2 verifies the received against the stored . If the verification is successful, S2 forwards the valué to SI for verifying the authenticity of S2. On the other hand, the server SI computes a secret key and passes the parameter 'H' to the client. With the received key generation parameter, the client validates the server. Finally, the client and server SI generate a secret key as shown in Figure 2.
In most cases, the success of a cryptographic attack is based on finding weaknesses in the structure of the protocol. Based on the model and security definition, a particular scheme can be analyzed against attacks to be provable from the state of definition. Proof of correctness, proof of resistance of the protocol against passive attacks, active attacks, offline dictionary attacks and security compliance are discussed in this section.
Statement: 3D PAKE protocol is correct if
K =K'.
Proof:
In server side, SI computes key K from A, S2 and Ss, where
= K= Hash (Ss, 1)
In client side key K' is computed from B andSu, where
Therefore, S'u = (B)a
Key K' = Hash (Su, 1)
As K = K', the protocol is proven for its correctness.
The random oracle model (Bellare & Rogaway, 1993) is used by the research community to evalúate the security schemes that are constructed using hash functions. In the random oracle model, the behaviour of a hash function is imitated by a deterministic and a proficient function that yields consistently distributed arbitrary valúes. The 3D PAKE protocol is secure under random oracle model, as the hash valué generated is random and irreversible.
Theorem 1: Under the random oracle model, the proposed 3D PAKE protocol is defensive against passive attack with a collision-resistant hash function ' Hash'.
Proof:
Consider that an adversary γ monitors all the Communications between SI and C and between SI and S2. Let's contradictorily prove this, by taking into consideration that the messages exchanged between SI, S2 and client C are traced by γ. Even though γ is able to read the messages of SI and C; SI and S2, obtaining the password from is infeasible, as it is a discrete logarithm problem and there exists no efficient algorithm for quantum computers to obtain a solution for discrete logarithm problem. In a similar sense, if γ obtains (i-e-,) V1 /V2 from the messages M2/M3, it is impossible for the adversary to obtain θ /ω. In addition, obtaining a, b1 , b2 from A, B2, B, S1 , S2 is quite challenging. It is impossible to obtain the vertices of the triangle from the circumcenter ( ω) and the angle between the medians (θ). A random one-way hash function is used for transmitting messages between the peers. Hence, 'Hash', b4 and Su is said to be secure under the random oracle model. Thus, a passive attacker γ unable to obtain the password P and the secret keyK. Hence the proposed protocol is proven to be defensive against passive attack.
Theorem 2: The proposed 3D PAKE protocol is defensive against active attack, if there is no existence of polynomial-time algorithm to break the Discrete Logarithm Problem (DLP).
Proof:
Assumption (i): Assume that an active adversary y impersonate as client C by compromising server S1/S2.
Assume that an active adversary γ modifies as .Let's contradictorily prove this, by taking into consideration that an active adversary γ has compromised server S1/S2 to impersonate as client C, by replacing/modifying transferred in message MI with arbitrary number . Since the challenger receives instead of , client verification fails at server side as per Equation (1).
Assume that adversary γ modifies the valué Su transferred in message M5 as Suv. Since, the challenger receives Suv instead of Su , establishment of key is liable to failure in server SI side as per Equation (2).
Further, imagine that the adversary γ is assuming ) as transferred in message M5 for the key generation in server S1. Since, the challenger receives A' instead of A, verification of server is liable to failure on client side as per Equation (3).
In server side
In client side,
Therefore, K ≠K'.
Analysis:
Considering the case as, and the active adversary γ cannot succeed in generating the secret key K, such that K= K'.
Assumption (ii): Assume that an active adversary y impersonate as server SI by compromising server S2.
Assume that an active adversary γ modifies as . Let's contradictorily prove this, by taking into consideration, that an active adversary γ has compromised the server S2 to impersonate as server SI by replacing/modifying the messages exchanged between the server and the client. Such an adversary may modify the valué transferred in message MI with a random number. Authentication and key exchange process terminates as proved in Assumption (i): case (a) of Theorem 2. Challenger tries to construct the triangle from and examines whether calculated . As an effect, triangle construction is not possible by γ as the valué g4 is not known to the adversary.
The adversary γ tries to modify the valúes transferred in messages M4: B, M5: A, Su and M8: H. Challenger verifies whether and . Retrieving the valué b3 is impossible by γ as the valué is stored in server SI. Modifications in messages M4, M5 or in M8, leads to termination of the key generation process as per Assumption (i): case (a) and (b) of Theorem 2.
Analysis:
Thus, by modifying the valúes in messages M4: B, M5: A,Su , M8: H and as , the active adversary γ can't prevail in generating the secret key K.
Assumption (iii): Assume that an active adversary y impersonate as server S2 by compromising server SI.
Assume that an active adversary γ has compromised the server SI to impersonate as server S2 by replacing/modifying the messages exchanged between the server and the client. Such an adversary may modify the valué transferred in message M2 with a random number. Challenger verifies received with stored . As an effect, retrieving the stored valué is impossible by γ, since, the valué is known only to server S2.
The adversary γ may try to modify the values transferred in messages M6: A, Su, S1 or M7: b4 , S2 . Challenger computes . Retrieving valué b4 is impossible by γ, since, the value is stored in server S2. Altering the valúes in messages M6/M7, terminates the key generation process as proved in Assumption (i): case (a) and (b) of Theorem 2.
Analysis:
Thus, by modifying the valúes of the messages M6: A, Sui ,S1 , M7: b4 ,S2 or with a random number by the active adversary γ cannot succeed in generating the secret key K.
Remark 1:
Active impersonation of one server as another is possible in Yang et al. (2006) model. 3D PAKE protocol routs the drawback of Yang et al. protocol and proved it is secure against impersonation attacks on server SI and S2 as shown by Theorems 1 and 2. When both the servers are compromised by the intruder, it is infeasible to determine the password 'P' from the stored valúes, based on the properties of the tetrahedron. It is demonstrated that the proposed 3D protocol is strong and intractable, when compared to existing two-server PAKE protocols in the circumstance of the servers' datábase are controlled by the adversaries.
Theorem 3: The proposed 3D PAKE protocol is defensive against offline dictionary attack by providing two levéis of security.
Proof:
Assumption (i): Assume that an active adversary y breaks the 3D PAKE protocol under offline dictonary attack.
Assurance of primary level of security by β. Let´s contradictorily prove this, by taking into consideration, when the adversary . γ attains Access to the database of both the servers by dictonary attack, the adversary obtain values.
However, deriving θ and ω from and respectively is NP hard. Hence, it cannot be resolved in polynomial time. Thus, primary level of security is guaranteed.
Assurance of the second level of security by β. If the adversary γ manages to solve DLP, then θ and ω valúes are attained by the adversary. However, finding the vértices of the triangle θ and ω are derived from Henceforth, second level of security is assured.
The protocol has been tested with Sqlmap, Wireshark, Havij, Vega, Websecurify, Webcruiser, SSLSmart, WSAttacker and WSDigger to affirm the strength of the protocol. In addition, 3D PAKE complies with known key security, forward secrecy, key control, key confirmation, zero-knowledge proof, explicit key authentication, key freshness, impersonation resilience and reciprocity principies. Also, it is sturdy against low-encryption-exponent attack, known and chosen cipher text attack, known and chosen plaintext attack, sniffer attack, replay attack, man in the middle attack and rainbow table attack. Table 2 summarizes the security standards of the proposed protocol and it proves that the proposed protocol is rigid.
The data set used to test the protocol comprises of 100000 passwords. Table 3 shows the experimental results of 3D PAKE Protocol tested for a healthcare application. Password transformation relies upon tetrahedron parameters ω and θ. The valué of ϑ and θ shows the prominence of heuristic information and their impacts. Key length adopted in 3D PAKE is 3072-bits for proper regulation and to prevent illegitímate access.
The performance of the proposed 3D PAKE protocol is analyzed by comparison with the existing two-server PAKE protocols. Number of group elements in communication are measured in terms of 'L' and the number of hash valúes in communication is measured in terms of '1'. The communication complexity includes number of group elements in communication, the number of hash valúes in communication and the number of rounds taken by the protocol for successful completion.
Communication complexity of 3D PAKE is 9L + 41 and computational complexity is 32, which is very near to that of existing protocols as presented in Table 4. Slight increase in computation is due to the construction of the tetrahedron. It is noticed that the client side complexity is considerably reduced. Furthermore, as the proposed protocol is asymmetric, there is a notable difference in the server side because of the communication between the servers SI and S2. However, this computational complexity can be negotiated as the server S2 is hidden and protected from security vulnerabilities. Nevertheless, it routs the postulation made by other protocols and augments the security.
For a clear understanding, valúes are graphically presented in Figure 3. From Figure 3, it can be inferred that 3D PAKE provides a fair communication complexity. For a broad computational cost analysis, the number of transmissions, hash computations, modular/scalar multiplications, XOR operations and modular exponentiations are examined. The proposed 3D PAKE protocol computation wise performs in a fair manner when compared to Yang et al. (2006), Yi et al. (2013), and Jin et al. (2007) protocols as shown in Table 5.
Thus, the proposed 3D PAKE performs judiciously computation wise. To the best of our cognizance, a foolproof two-server 3D PAKE protocol is proposed based on tetrahedron properties and proved its resistance against attacks.
A formal design and evaluation of a state-of-art tetrahedron (3D) based two-server PAKE protocol is presented in this paper with definite proof of security. With the assistance of ω and ϑ parameters, offline dictionary attacks oceurring on the server's datábase are proclaimed as a challenge as rightly pointed and proved in section 4.4; thereby, obtaining the password is infeasible when both the servers are compromised. This assures the robustness of the protocol against dictionary attack in 3D. It is also observed, that the 3D PAKE protocol is performing reasonably well in communication and computation, as discussed in section 5.1. As a future avenue of research, the proposed 3D PAKE protocol security can be reinforced constantly by adding additional parameters / shapes with formal proof of security.
CONFLICT OF INTEREST
The autors have no conflicts of interest to declare.
*Corresponding author. E-mail address:anitha.psgsoft@gmail.com(Anitha Kumari K.) Peer Review under the responsibility of Universidad Nacional Autónoma de México. http://