Publication | Closed Access
Refinement and extension of encrypted key exchange
253
Citations
10
References
1995
Year
Lightweight Authentication MechanismEngineeringEncrypted Key ExchangeAuthentication ProtocolInformation SecurityCryptographic ProtectionCryptographic TechnologyData PrivacyElegant MethodKey ManagementKey ExchangeBlockchainSecure ProtocolData SecurityCryptographyWeak Passwords
In their recent paper, "Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks," Bellovin and Merritt propose a novel and elegant method for safeguarding weak passwords. This paper discusses a possible weakness in the proposed protocol, develops some enhancements and simplifications, and provides a security analysis of the resultant minimal EKE protocol. In addition, the basic 2-party EKE model is extended to the 3-party setting; this yields a protocol with some interesting properties. Most importantly, this paper illustrates, once again, the subtlety associated with designing password-based protocols.
| Year | Citations | |
|---|---|---|
Page 1
Page 1