Security

Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol

Download Now Free registration required

Executive Summary

This paper shows several security weaknesses of a Multi-Factor Authenticated Key Exchange (MK-AKE) protocol, proposed by Pointcheval and Zimmer at ACNS'08. The Pointcheval-Zimmer scheme was designed to combine three authentication factors in one system, including a password, a secure token (that stores a private key) and biometrics. In a formal model, Pointcheval and Zimmer formally proved that an attacker had to break all three factors to win. However, the formal model only considers the threat that an attacker may impersonate the client; it however does not discuss what will happen if the attacker impersonates the server. The authors fill the gap by analyzing the case of the server impersonation, which is a realistic threat in practice.

  • Format: PDF
  • Size: 514.1 KB