Encrypted key exchange: password-based protocols secure against dictionary attacks
TL;DR: A combination of asymmetric (public-key) and symmetric (secret- key) cryptography that allow two parties sharing a common password to exchange confidential and authenticated information over an insecure network is introduced.
Abstract: Classic cryptographic protocols based on user-chosen keys allow an attacker to mount password-guessing attacks. A combination of asymmetric (public-key) and symmetric (secret-key) cryptography that allow two parties sharing a common password to exchange confidential and authenticated information over an insecure network is introduced. In particular, a protocol relying on the counter-intuitive motion of using a secret key to encrypt a public key is presented. Such protocols are secure against active attacks, and have the property that the password is protected against offline dictionary attacks. >
...read more
Citations
7,643 citations
1,339 citations
Cites background or methods from "Encrypted key exchange: password-ba..."
...In this section we prove the security of the two ows at the center of Bellovin and Merritt's EKE protocol [6]....
[...]
...The above protocol problem was rst suggested by Bellovin and Merritt [6], who also o er a protocol, Encrypted Key Exchange (EKE), and some informal security analysis....
[...]
...In Section 4 we de ne EKE2, which is essentially the pair of ows at the center of Bellovin and Merritt's Di e-Hellman based Encrypted Key Exchange protocol [6]....
[...]
923 citations
811 citations
786 citations