Secure sessions from weak secrets

  • Authors:
  • Bruce Christianson

  • Affiliations:
  • University of Hertfordshire

  • Venue:
  • Proceedings of the 11th international conference on Security Protocols
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

This story starts with a specific protocol, which we thought up in the Eagle back in 1997, and which was inspired by an earlier Security Protocol Workshop. Here's the protocol, which is intended to leverage a weak shared password k up into a fresh random strong shared secret s: