Authenticated Key Exchange Secure Against Dictionary Attacks

Download Now
Provided by: University of Calgary
Topic: Security
Format: PDF
Password-based protocols for Authenticated Key Exchange (AKE) are designed to work despite the use of passwords drawn from a space so small that an adversary might well enumerate, off line, all possible passwords While several such protocols have been suggested, the underlying theory has been lagging. The authors begin by defining a model for this problem, one rich enough to deal with password guessing, forward secrecy, server compromise, and loss of session keys The one model can be used to define various goals. They take AKE (with \"Implicit\" authentication) as the \"Basic\" goal, and they give definitions for it and for entity-authentication goals as well.
Download Now

Find By Topic