Next Article in Journal
YOLO-HDEW: An Efficient PCB Defect Detection Model
Previous Article in Journal
Radio Frequency Passive Tagging System Enabling Object Recognition and Alignment by Robotic Hands
Previous Article in Special Issue
Enhancing Adversarial Robustness in Network Intrusion Detection: A Novel Adversarially Trained Neural Network Approach
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

CPace Protocol—From the Perspective of Malicious Cryptography

by
Mirosław Kutyłowski
*,†,‡,
Przemysław Kubiak
†,‡ and
Paweł Kostkiewicz
NASK National Research Institute, Kolska 12, 01-045 Warsaw, Poland
*
Author to whom correspondence should be addressed.
Current address: NASK National Research Institute, Kolska 12, 01-045 Warsaw, Poland
These authors contributed equally to this work.
Electronics 2025, 14(17), 3382; https://doi.org/10.3390/electronics14173382 (registering DOI)
Submission received: 24 July 2025 / Revised: 18 August 2025 / Accepted: 19 August 2025 / Published: 25 August 2025
(This article belongs to the Special Issue Recent Advances in Information Security and Data Privacy)

Abstract

The CPace protocol (Internet-Draft:draft-irtf-cfrg-cpace-14) is a password-authenticated key exchange optimized for simplicity. In particular, it involves only two messages exchanged in an arbitrary order. CPace combines a simple and elegant design with privacy guarantees obtained via strict mathematical proofs. In this paper, we go further and analyze its resilience against malicious cryptography implementations. While the clever design of CPace immediately eliminates many kleptographic techniques applicable to many other protocols of this kind, we point to the remaining risks related to kleptographic setups. We show that such attacks can break the security and privacy features of CPace. Thereby, we point to the necessity of very careful certification of the devices running CPace, focusing in particular on critical threats related to random number generators.
Keywords: password authentication; key establishment; PAKE; CPace; malicious cryptography; random number generator; key leakage; password leakage password authentication; key establishment; PAKE; CPace; malicious cryptography; random number generator; key leakage; password leakage

Share and Cite

MDPI and ACS Style

Kutyłowski, M.; Kubiak, P.; Kostkiewicz, P. CPace Protocol—From the Perspective of Malicious Cryptography. Electronics 2025, 14, 3382. https://doi.org/10.3390/electronics14173382

AMA Style

Kutyłowski M, Kubiak P, Kostkiewicz P. CPace Protocol—From the Perspective of Malicious Cryptography. Electronics. 2025; 14(17):3382. https://doi.org/10.3390/electronics14173382

Chicago/Turabian Style

Kutyłowski, Mirosław, Przemysław Kubiak, and Paweł Kostkiewicz. 2025. "CPace Protocol—From the Perspective of Malicious Cryptography" Electronics 14, no. 17: 3382. https://doi.org/10.3390/electronics14173382

APA Style

Kutyłowski, M., Kubiak, P., & Kostkiewicz, P. (2025). CPace Protocol—From the Perspective of Malicious Cryptography. Electronics, 14(17), 3382. https://doi.org/10.3390/electronics14173382

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop