Encrypted key exchange: password-based protocols secure against dictionary attacks
Citations
6 citations
Cites background from "Encrypted key exchange: password-ba..."
...Such protocols were proposed by Bellovin and Merritt [2,3], Jablon [4] and Wu [5], among others....
[...]
..., xk are generated uniformly randomly from the interval [1, 2]...
[...]
6 citations
6 citations
Cites background from "Encrypted key exchange: password-ba..."
...It makes two communication parties have a secret session key to protect their subsequent communications on an efficient way, and intends the servers to involve with the key exchange procedure to derive the session key for the lawful interception support....
[...]
6 citations
6 citations
Cites methods from "Encrypted key exchange: password-ba..."
...Here we turn this to our advantage by piggybacking frames with parts of a Diffie-Hellman [14] based keys shares of EKE [6]....
[...]
...The last two versions of our schemes: time-triggered minimax and the randomized delay key negotiation set room for piggybacking frames with parts of the keys that are shared via the Diffie-Hellman (DH) version of the Encrypted-KeyExchange protocol (EKE) [6] and Simple Password Exponential Key Exchange (SPEKE) [22]....
[...]
...For the case of a stronger adversary, that has full control over the nodes, we later design a protocol that uses a weak existing secret along with the initial version of our schemes to securely exchange a session key based on guessing resilient protocol Encrypted Key Exchange (EKE) [5], [6]....
[...]
References
14,980 citations
"Encrypted key exchange: password-ba..." refers background or methods in this paper
...ElGamal’s algorithm is derived from the DiffieHellman exponential key exchange protocol[2]; accordingly, we will review the latter first....
[...]
...And even this risk is minimal if B performs certain checks to guard against easily-solvable choices: that β is indeed prime, that it is large enough (and hence not susceptible to precalculation of tables), that β − 1 have at least one large prime factor (to guard against Pohlig and Hellman’s algorithm[13]), and that α is a primitive root of GF (β)....
[...]
...The use given above for asymmetric encryption — simply using it to pass a key for a symmetric encryption system — is an example of what Diffie and Hellman[2] call a public key distribution system....
[...]
...It works especially well with exponential key exchange [2]....
[...]
14,659 citations
"Encrypted key exchange: password-ba..." refers methods in this paper
...Section 2 describes the asymmetric cryptosystem variant and implementations using RSA[ 3 ] and ElGamal[4]....
[...]
...We will use RSA[ 3 ] to illustrate the difficulties....
[...]
7,514 citations
2,351 citations
1,937 citations
"Encrypted key exchange: password-ba..." refers background in this paper
...Can such a random odd number less than a known n be distinguished from a valid public key e? Assume that p and q are chosen to be of the form 2p′ + 1 and 2q′ + 1, where p′ and q′ are primes, a choice that is recommended for other reasons [9]....
[...]