Abstract
In this paper, a new lattice-based password-authenticated key exchange protocol (PAKE) is proposed for the post-quantum era. The constructed Saber.PAKE is designed as a PAKE version of Saber (D’Anvers, in: International conference on cryptology in Africa, Springer, Cham, 2018), one of the finalist key encapsulation mechanisms of the National Institute of Standards and Technology’s post-quantum secure standardization process. It is designed as a three-pass protocol and follows an explicit authentication approach. The hardness assumption is based on the module learning with rounding (MLWR) problem. To obtain post-quantum secure lattice-based PAKE, the password-authenticated key exchange (PAK) (MacKenzie, in: a P1363. submission to the IEEE P1363 Working Group, 2002) design idea is adapted to MLWR. To the best of our knowledge, Saber.PAKE is the first PAKE protocol based on (ring/module) learning with rounding ((R/M)LWR) problems. By considering the reconciliation bounds, the correctness analysis of Saber.PAKE is presented. The robustness against dictionary and common attacks are examined in the random oracle model. The proposed PAKE also provides perfect forward secrecy and mutual authentication. The experimental results show that it has the relatively smallest CPU cycles, message size, and runtime than the other lattice-based PAKE protocols.
Similar content being viewed by others
Data availability
Not applicable.
References
D’Anvers JP, Karmakar A, Roy SS, Vercauteren F. Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM. In: International Conference on Cryptology in Africa, pp. 282-305, Springer, Cham (2018)
MacKenzie P . The PAK suite: Protocols for password-authenticated key exchange. a P1363. submission to the IEEE P1363 Working Group, (2002)
Dharminder D, Reddy CB, Das AK, Park Y, Jamal SS (2022). Post-Quantum Lattice Based Secure Reconciliation Enabled Key Agreement Protocol for IoT. IEEE Internet of Things Journal
Kumar U, Garg M, Kumari S, Dharminder D (2023) A construction of post quantum secure and signal leakage resistant authenticated key agreement protocol for mobile communication. Trans Emerg Telecommun Technol 34(1):e4660
Ott D, Peikert C (2019) “Identifying research challenges in post quantum cryptography migration and cryptographic agility,” arXiv preprint arXiv:1909.07353
Akleylek S, Seyhan K (2020) A probably secure bi-GISIS based modified AKE scheme with reusable keys. IEEE Access 8:26210–26222
Akleylek S, Seyhan K (2022) Module learning with rounding based key agreement scheme with modified reconciliation. Comput Stand Interfaces 79:103549
Boyko V, MacKenzie P, Patel S . Provably secure password-authenticated key exchange using Diffie-Hellman. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp 156-171, Springer, Berlin, Heidelberg (2000)
Bellovin SM, Merritt M (1992). Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp 72-84
Bellare M, Pointcheval D, Rogaway P. (2000) Authenticated key exchange secure against dictionary attacks. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp 139-155, Springer, Berlin, Heidelberg
Wu TD et al (1998) The Secure Remote Password Protocol. In NDSS 98:97–111
Shin S, Kobara K (2012) Efficient Augmented Password-Only Authentication and Key Exchange for IKEv2. RFC 6628:1–20
Bellovin SM, Merritt M (1993). Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp 244-250
Hao F, Ryan PY (2008). Password authenticated key exchange by juggling. In: International Workshop on Security Protocols, pp 159-171. Springer, Berlin, Heidelberg
Jablon DP (1996) Strong password-only authenticated key exchange. ACM SIGCOMM Computer Communication Review 26(5):5–26
Kumari KA, Sadasivam GS, Rohini L (2016) An efficient 3d elliptic curve Diffie-Hellman (ECDH) based two-server password-only authenticated key exchange protocol with provable security. IETE J Res 62(6):762–773
Hao F, van Oorschot PC (2021). SoK: Password-Authenticated Key Exchange–Theory, Practice, Standardization and Real-World Lessons. Cryptology ePrint Archive, 2021/1492
SRP Protocol Design. Accessed 21 Apr 2022. http://srp.stanford.edu/design.html
Technical Guideline TR-03110, Advanced Security Mechanisms for Machine Readable Travel Documents and eIDAS Token - Part 4: Applications and Document Profiles, Version 2.21, 21 December 2016. Accessed 21 Apr 2022
WPA3\(^{{\rm TM}}\) Specification Version 3.0. Accessed on: 21 April 2022. https://www.wi-fi.org/download.php?file=/sites/default/files/private/WPA3_Specification_v3.0.pdf
Jablon DP (1997). Extended password key exchange protocols immune to dictionary attack. In: Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp 248-255, IEEE
Kwon T (2000). Summary of AMP (authentication and key agreement via memorable passwords). Draft Document, August, Cryptology ePrint Archive, 2021/1492
Shor PW (1994). Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp 124-134, IEEE
IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques. (2009) In IEEE Std 1363.2-2008, pp1-140
Peikert C (2016) A decade of lattice cryptography. Found Trends Theor Comput Sci 10(4):283–424
Katz J, Vaikuntanathan V (2009). Smooth projective hashing and password-based authenticated key exchange from lattices. In: International Conference on the Theory and Application of Cryptology and Information Security, pp 636-652, Springer, Berlin, Heidelberg
Ding J, Alsayigh S, Lancrenon J, RV S, Snook M (2017). Provably secure password authenticated key exchange based on RLWE for the post-quantum world. In: Cryptographers’ Track at the RSA Conference, pp 183-204, Springer, Cham
Xu D, He D, Choo KKR, Chen J (2017). Provably secure three-party password authenticated key exchange protocol based on ring learning with error. Cryptology ePrint Archive, 2017/360
Guo J, Du Y (2020). A Novel RLWE-Based Anonymous Mutual Authentication Protocol for Space Information Network. Security and Communication Networks, 2020
Yin A, Guo Y, Song Y, Qu T, Fang C (2020) Two-round password-based authenticated key exchange from lattices. Wirel Commun Mobile Comput 2020:1–13
Li Z, Wang D (2019) Achieving one-round password-based authenticated key exchange over lattices. IEEE Trans Serv Comput 15(1):308–321
Liu C, Zheng Z, Jia K, You Q (2019). Provably secure three-party password-based authenticated key exchange from RLWE. In: International Conference on Information Security Practice and Experience, pp 56-72, Springer, Cham
Huszti A, Kovács S, Oláh N (2022) Scalable, password-based and threshold authentication for smart homes. Int J Inf Secur 21:1–17
Khan H, Dowling B, Martin KM (2022) Pragmatic authenticated key agreement for IEEE Std 802.15.6. Int J Inf Secur 21(3):577–595
Rana S, Mishra D (2021) Lattice-based key agreement protocol under ring-LWE problem for IoT-enabled smart devices. Sādhanā 46(2):84
Dharminder D, Chandran KP (2020) LWESM: learning with error based secure communication in mobile devices using fuzzy extractor. J Ambient Intell Humaniz Comput 11(10):4089–4100
Dabra V, Bala A, Kumari S (2020) LBA-PAKE: lattice-based anonymous password authenticated key exchange for mobile devices. IEEE Syst J 15(4):5067–5077
Ding R, Cheng C, Qin Y (2022) Further analysis and improvements of a lattice-based anonymous PAKE scheme. IEEE Syst J 16(3):5035–5043
Bellare M, Rogaway P (1995). Provably secure session key distribution: the three party case. In: Proceedings of the twenty-seventh annual ACM symposium on Theory of computing (pp 57-66)
Jheng YS, Tso R, Chen CM, Wu ME (2018). Password-based authenticated key exchange from lattices for client/server model. In: Advances in Computer Science and Ubiquitous Computing: CSA-CUTE 17 (pp 315-319). Springer, Singapore
Ding J, Xie X, Lin X (2012). A simple provably secure key exchange scheme based on the learning with errors problem. Cryptology ePrint Archive
Feng H (2021, 29 September). An Overview of Password-authenticated Key Exchange Protocols. Accessed on: 19.04.2022. https://uk-sps.org/seminar/an-overview-of-password-authenticated-key-exchange-protocols/
Hao F (2021) Prudent practices in security standardization. IEEE Commun Stand Mag 5(3):40–47
NIST Post-Quantum Cryptography Standardization Project. Accessed on 25.04.2022. https://csrc.nist.gov/projects/post-quantum-cryptography
Alagic G et al (2022) Status report on the third round of the NIST post-quantum cryptography standardization process. US Department of Commerce, NIST
Ding J et al (2017) Provably secure password authenticated key exchange based on RLWE for the post-quantum world. Topics in Cryptology -CT-RSA 2017. Lecture Notes in Computer Science 10159: 183–204
Gao X, et al (2017). Efficient implementation of password-based authenticated key exchange from RLWE and post-quantum TLS. Cryptology ePrint Archive. 2017/1192
Yang Y, et al (2019). Efficient password-authenticated key exchange from RLWE based on asymmetric key consensus. In: International Conference on Information Security and Cryptology, 31-49
Ren P, Gu X, Wang Z (2023) Efficient module learning with errors-based post-quantum password-authenticated key exchange. IET Inf Secur 17(1):3–17
Jin Z, Zhao Y (2016). Optimal key consensus in presence of noise. arXiv preprint arXiv:1611.06150
Regev O (2009) On lattices, learning with errors, random linear codes, and cryptography. J ACM 56(6):1–40
Peikert C (2016) A decade of lattice cryptography. Found Trends Theor Comput Sci 10:283–424
Banerjee A, Peikert C, Rosen A (2012) Pseudorandom functions and lattices. In: Pointcheval D, Johansson T (eds) Advances in Cryptology - EUROCRYPT 2012. EUROCRYPT 2012. Lecture Notes in Computer Science, 7237, Springer, Berlin, Heidelberg
Liu FH, Wang Z (2020). Rounding in the rings. In Annual International Cryptology Conference, pp. 296-326, Springer, Cham
Mera JMB, Karmakar A, Kundu S, Verbauwhede I (2021) Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms. IACR Trans Cryptogr Hardw Embed Syst 2021:474–509
Wu TD (1998) The secure remote password protocol. In NDSS 98: 97–111
Gennaro R, Lindell Y (2006) A framework for password-based authenticated key exchange1. ACM Trans Inf Syst Secur 9(2):181–234
Benhamouda F, Blazy O, Ducas L, Quach W (2018, March). Hash proof systems over lattices revisited. In: IACR International Workshop on Public Key Cryptography, pp 644-674, Springer, Cham
Zhang J, Zhang Z, Ding J, Snook M, Dagdelen Ö. (2015). Authenticated key exchange from ideal lattices. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp 719-751, Springer, Berlin, Heidelberg
Acknowledgements
We would like to thank Ahmet Faruk Dursun for his support in developing and testing the C codes.
Funding
This work was partially supported by TUBITAK under Grant No. 121R006. The work of Kübra Seyhan was supported in part by TUBITAK through National Ph.D. Scholarship Program in the Priority Fields in Science and Technology.
Author information
Authors and Affiliations
Contributions
KS and SA were involved in conceptualization, methodology, validation, and writing—review and editing. SA was involved in investigation. KS was involved in writing—original draft preparation. All authors have read and agreed to the submitted version of the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
All authors declare that none of them has any conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Seyhan, K., Akleylek, S. A new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE. J Supercomput 79, 17859–17896 (2023). https://doi.org/10.1007/s11227-023-05251-x
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-023-05251-x