June 30, 2024, 7:06 a.m. |

IACR News www.iacr.org

ePrint Report: Password-authenticated Key Exchange and Applications

Kristian Gjøsteen


We analyse a two password-authenticated key exchange protocols, a variant of CPace and a protocol related to the well-known SRP protocol. Our security results are tight. The first result gives us some information about trade-offs for design choices in CPace. The second result provides information about the security of SRP.


Our analysis is done in a new game-based security definition for password-authenticated key exchange. Our definition accomodates arbitrary password sampling methodologies. …

applications design eprint report exchange information key password protocol protocols report result results security trade trade-offs well-known

Account Executive

@ Darktrace | Vancouver

Account Executive

@ Darktrace | Seattle

Cyber Security Risk Analyst Lead

@ Leidos | Canberra, Australia

ICT Security Operations Lead

@ Leidos | Canberra, Australia

Développeur AZURE DEVOPS (H/F)

@ Apside | Strasbourg, Grand Est, France

Business Analyst

@ BridgePhase | San Antonio, TX