Refinement and extension of encrypted key exchange
- 1 July 1995
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGOPS Operating Systems Review
- Vol. 29 (3), 22-30
- https://doi.org/10.1145/206826.206834
Abstract
In their recent paper, "Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks," Bellovin and Merritt propose a novel and elegant method for safeguarding weak passwords. This paper discusses a possible weakness in the proposed protocol, develops some enhancements and simplifications, and provides a security analysis of the resultant minimal EKE protocol. In addition, the basic 2-party EKE model is extended to the 3-party setting; this yields a protocol with some interesting properties. Most importantly, this paper illustrates, once again, the subtlety associated with designing password-based protocols.Keywords
This publication has 6 references indexed in Scilit:
- Augmented encrypted key exchangePublished by Association for Computing Machinery (ACM) ,1993
- Lower bounds on messages and rounds for network authentication protocolsPublished by Association for Computing Machinery (ACM) ,1993
- The MD5 Message-Digest AlgorithmPublished by RFC Editor ,1992
- Authentication revisitedACM SIGOPS Operating Systems Review, 1987
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978