Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise

  • Authors:
  • Steven M. Bellovin;Michael Merritt

  • Affiliations:
  • AT&T Bell Laboratories;AT&T Bell Laboratories

  • Venue:
  • CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
  • Year:
  • 1993

Quantified Score

Hi-index 0.00

Visualization

Abstract

The encrypted key exchange (EKE) protocol is augmented so that hosts do not store cleartext passwords. Consequently, adversaries who obtain the one-way encrypted password file may (i) successfully mimic (spoof) the host to the user, and (ii) mount dictionary attacks against the encrypted passwords, but cannot mimic the user to the host. Moreover, the important security properties of EKE are preserved—an active network attacker obtains insufficient information to mount dictionary attacks. Two ways to accomplish this are shown, one using digital signatures and one that relies on a family of commutative one-way functions.