Publication | Open Access
Encrypted key exchange: password-based protocols secure against dictionary attacks
1.3K
Citations
17
References
2003
Year
Unknown Venue
EngineeringInformation SecurityFormal VerificationPublic Key AlgorithmEncrypted Key ExchangeSecurity ProtocolsSecure ProtocolAuthentication ProtocolUser-chosen KeysClassic Cryptographic ProtocolsNetworked Computer SystemsData PrivacyComputer ScienceCommon PasswordKey ManagementCybersecurity ProtocolsData SecurityCryptographyCryptographic Protection
Classic cryptographic protocols based on user-chosen keys allow an attacker to mount password-guessing attacks. A combination of asymmetric (public-key) and symmetric (secret-key) cryptography that allow two parties sharing a common password to exchange confidential and authenticated information over an insecure network is introduced. In particular, a protocol relying on the counter-intuitive motion of using a secret key to encrypt a public key is presented. Such protocols are secure against active attacks, and have the property that the password is protected against offline dictionary attacks.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">></ETX>
| Year | Citations | |
|---|---|---|
Page 1
Page 1