Chapter 50: Password-Based Authenticated Key Establishment Protocols

Jean Lancrenon1, Dalia Khader2, Peter Y.A. Ryan2, and Feng Hao3     1Interdisciplinary Centre for Security, Reliability and Trust, Luxembourg-Kirchberg, Luxembourg     2University of Luxemburg, Coudenhove-Kalergi, Luxembourg     3Newcastle University, Newcastle Upon Tyne, Netherlands

Abstract

If two parties wish to safely communicate over an insecure channel, one method they may use is to first run an authenticated key exchange protocol over this channel so as to jointly and secretly construct a cryptographically strong session key that can serve to subsequently secure further bulk communication. This chapter is an introduction to the design of such key exchange protocols when ...

Get Computer and Information Security Handbook, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.