Vpa-3p-Eke: A Verifier-Based Password-Authenticated 3p-Eke Protocol And Its Analysis

Research Article
Archana Raghuvamshi and Premchand Parvataneni
DOI: 
http://dx.doi.org/10.24327/ijrsr.2017.0811.1168
Subject: 
science
KeyWords: 
Public-key Cryptosystem based on Logarithmic Approach(PCLA), Asymmetric Model, Verifier-based, Three-Party Encrypted Key Exchange (3P-EKE), Security Analysis, Performance Analysis.
Abstract: 

This paper attempts to probe a new model for the standard structure of a Verifier-Based PasswordAuthenticated Three-Party Encrypted Key Exchange (VPA-3P-EKE) protocol which concedes more efficient model. A previous model presented by Archana et al. [1], is more secured against all types of attacks like password guessing, replay, pre-play, man-in-the-middle attack, etc., but unfortunately, this protocol does not solve the problem of a server compromise completely, because it is defined in a symmetric model. These drawbacks help as inspiration to search for another standard model which overcomes the existing problems in a smart way. The model which we design yields discerning explanation about the existing attacks that are not solved in our previous model. Further, it lets straight transformation from a group of approach private-key encryption to a hybrid (symmetric & Asymmetric) one without major hassle. This paper endeavors to probe a novel framework for establishing a secure session key based on an asymmetric model by using PCLA keys [2]. PCLA is a novel Public-key Cryptosystem based on the Logarithmic Approach proposed by Archana et al. in 2012[2].