Refinement and extension of encrypted key exchange

  • Authors:
  • Michael Steiner;Gene Tsudik;Michael Waidner

  • Affiliations:
  • Communications and Computer Science Department, IBM Zfirich Research Laboratory, CH-8803 Riischlikon, Switzerland;Communications and Computer Science Department, IBM Zfirich Research Laboratory, CH-8803 Riischlikon, Switzerland;Communications and Computer Science Department, IBM Zfirich Research Laboratory, CH-8803 Riischlikon, Switzerland

  • Venue:
  • ACM SIGOPS Operating Systems Review
  • Year:
  • 1995

Quantified Score

Hi-index 0.01

Visualization

Abstract

In their recent paper, "Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks," Bellovin and Merritt propose a novel and elegant method for safeguarding weak passwords. This paper discusses a possible weakness in the proposed protocol, develops some enhancements and simplifications, and provides a security analysis of the resultant minimal EKE protocol. In addition, the basic 2-party EKE model is extended to the 3-party setting; this yields a protocol with some interesting properties. Most importantly, this paper illustrates, once again, the subtlety associated with designing password-based protocols.