<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 12 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:Tahoma;
panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
{font-family:Consolas;
panose-1:2 11 6 9 2 2 4 3 2 4;}
@font-face
{font-family:"Times New Roman \, serif";}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
color:black;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
{mso-style-priority:99;
mso-style-link:"Plain Text Char";
margin:0cm;
margin-bottom:.0001pt;
font-size:10.5pt;
font-family:Consolas;
color:black;}
pre
{mso-style-priority:99;
mso-style-link:"HTML Preformatted Char";
margin:0cm;
margin-bottom:.0001pt;
font-size:10.0pt;
font-family:"Courier New";
color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
{mso-style-priority:99;
mso-style-link:"Balloon Text Char";
margin:0cm;
margin-bottom:.0001pt;
font-size:8.0pt;
font-family:"Tahoma","sans-serif";
color:black;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
{mso-style-priority:34;
margin-top:0cm;
margin-right:0cm;
margin-bottom:0cm;
margin-left:36.0pt;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
color:black;}
span.PlainTextChar
{mso-style-name:"Plain Text Char";
mso-style-priority:99;
mso-style-link:"Plain Text";
font-family:Consolas;}
span.BalloonTextChar
{mso-style-name:"Balloon Text Char";
mso-style-priority:99;
mso-style-link:"Balloon Text";
font-family:"Tahoma","sans-serif";}
span.HTMLPreformattedChar
{mso-style-name:"HTML Preformatted Char";
mso-style-priority:99;
mso-style-link:"HTML Preformatted";
font-family:Consolas;
color:black;}
span.EmailStyle24
{mso-style-type:personal-reply;
font-family:"Calibri","sans-serif";
color:#1F497D;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
{page:WordSection1;}
/* List Definitions */
@list l0
{mso-list-id:1595821086;
mso-list-type:hybrid;
mso-list-template-ids:-2111941080 269025295 269025305 269025307 269025295 269025305 269025307 269025295 269025305 269025307;}
@list l0:level1
{mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l0:level2
{mso-level-tab-stop:72.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l0:level3
{mso-level-tab-stop:108.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l0:level4
{mso-level-tab-stop:144.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l0:level5
{mso-level-tab-stop:180.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l0:level6
{mso-level-tab-stop:216.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l0:level7
{mso-level-tab-stop:252.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l0:level8
{mso-level-tab-stop:288.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l0:level9
{mso-level-tab-stop:324.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;}
ol
{margin-bottom:0cm;}
ul
{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor="white" lang="EN-CA" link="blue" vlink="purple">
<div class="WordSection1">
<p class="MsoNormal"><span style="color:#1F497D">Hello Mike.<o:p></o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D">Hashing everything - I’m not assuming anything about the identities of Alice and Bob and the only messages before calculating abG are the P1 and P2 messages. All Alice and Bob know is they are supposed to talk
to the other person who knows the same password as them. Once Alice and Bob have a larger secret they can then reveal their identities to each other. I have already created a protocol to use the new shared secret as a session key but I’ve left that part
out since by keeping things so simple I should just be able to take the lower 128 bits of the bit representation of the point abG as a session key (I do intend to do a hash but I don’t think it is necessary and I don’t think it should be necessary to prove
the algorithm is secure.)<o:p></o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D">I could use some help understanding how using the same G2 on both sides weakens the security proof. It would not be practical to use different “G2” depending on who the partner device is since I don’t want to
have either side reveal anything about itself before exchanging P1 and P2.<o:p></o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D">I will read the link you sent me.<o:p></o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D">Thanks,<o:p></o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D">Jonathan<o:p></o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<div>
<div style="border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm 0cm 0cm">
<p class="MsoNormal"><b><span lang="EN-US" style="font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowtext">From:</span></b><span lang="EN-US" style="font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowtext"> Mike Hamburg [mailto:mike@shiftleft.org]
<br>
<b>Sent:</b> November-04-14 12:58 PM<br>
<b>To:</b> Jonathan Cressman; 'curves@moderncrypto.org'<br>
<b>Subject:</b> Re: [curves] A very simple PAKE<o:p></o:p></span></p>
</div>
</div>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Hello Jonathan,<br>
<br>
This is indeed a Simple PAKE. It's a stripped-down variant of SPAKE1, which is described in Abdalla and Pointcheval's paper "Simple Password-Based Encrypted Key Exchange Protocols":<br>
<br>
<a href="http://www.di.ens.fr/~mabdalla/papers/AbPo05a-letter.pdf">http://www.di.ens.fr/~mabdalla/papers/AbPo05a-letter.pdf</a><o:p></o:p></p>
<div>
<p class="MsoNormal"><br>
The main differences are that SPAKE uses different G2's for Alice and Bob, and that SPAKE1 computes the session key as Hash(Alice,Bob,P1,P2,abG). There is also a SPAKE2 which throws the password into the hash function too, for reasons having to do with the
security proof.<br>
<br>
IIRC (and it's possible I don't), it's safe to use the same G2 on both sides, but it weakens the security proof slightly (from CDH to CDH squaring).<br>
<br>
Omitting the hash is a more dangerous proposition. There are lots of attacks that the original paper doesn't have to worry about, just because it throws everything into that hash function. In particular, not hashing in the identities means that you aren't
sure who you're talking to, just that they have the same password.<br>
<br>
-- Mike<br>
<br>
On 11/04/2014 08:20 AM, Jonathan Cressman wrote:<o:p></o:p></p>
</div>
<blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
<p class="MsoNormal">Hello,<o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
<p class="MsoNormal">Sorry for potentially spamming your email reflector. I’m an embedded wireless programmer in need of a very simple Password Authenticated Key Exchange(PAKE). I believe I have created something similar to SPEKE but that works considerable
better over elliptic curves. I would like some help proving that it is secure.<o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
<p class="MsoNormal"><u>Set up</u><o:p></o:p></p>
<p class="MsoNormal">The Protocol begins with an elliptic curve over F<sub>2m</sub> with parameters T = (m, f(x), a, b, G, n, h) and G<sub>2</sub> as second generator of that group such that v, where vG = G<sub>2</sub> is unknown. Also given P an arbitrary
element of the group generated by G and aP finding a is hard. The curves 163k1 and 283k1 are such curves with these properties. T and G<sub>2</sub> are fixed and known by all implementers of the algorithm.<o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
<p class="MsoNormal">Convention: Capitals will be points on the curve and lower case letters will be integers.<o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
<p class="MsoNormal"><u>Algorithm</u><o:p></o:p></p>
<p class="MsoListParagraph" style="text-indent:-18.0pt;mso-list:l0 level1 lfo2"><![if !supportLists]><span style="mso-list:Ignore">1.<span style="font:7.0pt "Times New Roman"">
</span></span><![endif]><span lang="EN-AU">Let Alice and Bob have a shared password s, s is a “smallish” non-negative integer.
</span><o:p></o:p></p>
<p class="MsoListParagraph" style="text-indent:-18.0pt;mso-list:l0 level1 lfo2"><![if !supportLists]><span style="mso-list:Ignore">2.<span style="font:7.0pt "Times New Roman"">
</span></span><![endif]><span lang="EN-AU">Both Alice and Bob choose a number between 1 and n-2. Let these numbers be a and b. Alice sends the point P<sub>1</sub>=aG + sG<sub>2</sub> to Bob and Bob sends the point P<sub>2</sub> = bG+ sG<sub>2</sub> to Alice.</span><o:p></o:p></p>
<p class="MsoNormal" style="margin-left:18.0pt">3a. Alice verifies P<sub>2</sub> is a generator of the group and then computes a(P<sub>2</sub> - sG<sub>2</sub>) = a(bG+ sG<sub>2</sub> - sG<sub>2</sub>) = abG<o:p></o:p></p>
<p class="MsoNormal" style="margin-left:18.0pt">3b. Bob verifies P<sub>1</sub> is a generator of the group and then computes b(P<sub>1</sub> - sG<sub>2</sub>) = b(aG+ sG<sub>2</sub> - sG<sub>2</sub>) = abG<o:p></o:p></p>
<p class="MsoNormal" style="margin-left:18.0pt">4. Alice and Bob verify that they both know the new shared secret abG.<o:p></o:p></p>
<p class="MsoNormal"><span style="font-size:12.0pt;font-family:"Times New Roman , serif","serif""> </span><o:p></o:p></p>
<p class="MsoNormal">If Alice and Bob fail to agree on the new shared secret, abG, they know something has gone wrong.<o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
<p class="MsoNormal"><span lang="EN-US" style="font-size:10.5pt;font-family:"Arial","sans-serif";color:gray">..................</span><o:p></o:p></p>
<p class="MsoNormal" style="margin-top:6.0pt"><span lang="EN-US" style="font-size:10.5pt;font-family:"Arial","sans-serif";color:gray">Jonathan Cressman</span><o:p></o:p></p>
<p class="MsoNormal" style="margin-top:6.0pt"><span lang="EN-US" style="font-size:8.5pt;font-family:"Arial","sans-serif";color:gray">Firmware Developer</span><o:p></o:p></p>
<p class="MsoNormal" style="margin-bottom:12.0pt"><span style="font-size:8.5pt;font-family:"Arial","sans-serif";color:gray"><img border="0" width="293" height="45" id="Picture_x0020_1" src="cid:image001.gif@01CFF836.807ECDB0" alt="cid:image001.gif@01C91335.F4F940E0"></span><span lang="EN-US" style="font-size:8.5pt;font-family:"Arial","sans-serif";color:gray"><br>
</span><span lang="EN-US" style="font-size:9.0pt;font-family:"Arial","sans-serif";color:gray">Energate Inc. 2379 Holly Lane, Suite 200, Ottawa, Ontario, Canada K1V 7P2<br>
T: 613-482-7928 x226 F: 613-288-0816 <u><a href="http://www.energate.ca/">http://www.energateinc.com</a></u></span><o:p></o:p></p>
<p class="MsoPlainText"> <o:p></o:p></p>
<p class="MsoNormal"><span style="font-size:12.0pt;font-family:"Times New Roman","serif""><br>
<br>
<br>
<o:p></o:p></span></p>
<pre>_______________________________________________<o:p></o:p></pre>
<pre>Curves mailing list<o:p></o:p></pre>
<pre><a href="mailto:Curves@moderncrypto.org">Curves@moderncrypto.org</a><o:p></o:p></pre>
<pre><a href="https://moderncrypto.org/mailman/listinfo/curves">https://moderncrypto.org/mailman/listinfo/curves</a><o:p></o:p></pre>
</blockquote>
<p class="MsoNormal"><span style="font-size:12.0pt;font-family:"Times New Roman","serif""><o:p> </o:p></span></p>
</div>
</body>
</html>