Encrypted key exchange: password-based protocols secure against dictionary attacks
Citations
13 citations
Cites methods from "Encrypted key exchange: password-ba..."
...It supports client-server communications using standard Internet protocols such as HTTPS and FTP, and some special protocol such as DSR (Data Segment Resolution) protocol to distinguish operation, personal data and security information, and EKE (Encrypted Key Exchange) protocol for password authentication [17]....
[...]
13 citations
13 citations
13 citations
13 citations
Cites methods from "Encrypted key exchange: password-ba..."
...MVSec-I: Protocol using EKE 1....
[...]
...A conventional EKE scheme allows two participating entities to use a shared low-entropy password to derive a temporary shared key that can be used to authenticate the key exchange messages....
[...]
...We use a variant of the EKE scheme by treating a short shared secret Ks (20 bits) as a low entropy password....
[...]
...This protocol makes use of the Encrypted Key Exchange (EKE) [4] and is depicted in Figure 1....
[...]
...This protocol makes use of the Encrypted Key Exchange (EKE) [4] and is depicted in Figure 1....
[...]
References
14,980 citations
"Encrypted key exchange: password-ba..." refers background or methods in this paper
...ElGamal’s algorithm is derived from the DiffieHellman exponential key exchange protocol[2]; accordingly, we will review the latter first....
[...]
...And even this risk is minimal if B performs certain checks to guard against easily-solvable choices: that β is indeed prime, that it is large enough (and hence not susceptible to precalculation of tables), that β − 1 have at least one large prime factor (to guard against Pohlig and Hellman’s algorithm[13]), and that α is a primitive root of GF (β)....
[...]
...The use given above for asymmetric encryption — simply using it to pass a key for a symmetric encryption system — is an example of what Diffie and Hellman[2] call a public key distribution system....
[...]
...It works especially well with exponential key exchange [2]....
[...]
14,659 citations
"Encrypted key exchange: password-ba..." refers methods in this paper
...Section 2 describes the asymmetric cryptosystem variant and implementations using RSA[ 3 ] and ElGamal[4]....
[...]
...We will use RSA[ 3 ] to illustrate the difficulties....
[...]
7,514 citations
2,351 citations
1,937 citations
"Encrypted key exchange: password-ba..." refers background in this paper
...Can such a random odd number less than a known n be distinguished from a valid public key e? Assume that p and q are chosen to be of the form 2p′ + 1 and 2q′ + 1, where p′ and q′ are primes, a choice that is recommended for other reasons [9]....
[...]