Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Fortifying key negotiation schemes with poorly chosen passwords

Fortifying key negotiation schemes with poorly chosen passwords

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Electronics Letters — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Key exchange schemes such as Diffie Hellman are vulnerable to middleperson attacks, and thus are often augmented by means of shared secrets. Where these secrets must be memorised, they will usually be vulnerable to guessing attacks. The authors show how collision-rich hash functions can be used to detect such attacks while they are in progress and thus frustrate them.

References

    1. 1)
      • W. Diffie , M.E. Hellman . New directions in cryptography. IEEE Trans. , 6 , 650 - 654
    2. 2)
      • Bellovin, S.M., Merritt, M.: `Augmented encryped key exchange', Proc. 1st ACM Conf. Computer and Communications Security, 1993, p. 244–250.
    3. 3)
      • B. Kumar , J. Crowcroft . Integrating security in inter-domain routing protocols. Computer Communications Review , 5 , 36 - 51
    4. 4)
      • Diffie, W.: `Authenticated key exchange and secure interactive communications', SECURICOM 90, 1990.
    5. 5)
      • T.M.A. Lomas , B. Christianson . To whom am I speaking?. IEEE Computer Magazine
    6. 6)
      • Anderson, R.J.: `Why cryptosystems fail', Proc. 1st ACM Conf. Computer and Communications Security, 1993, p. 215–227.
    7. 7)
      • R.M. Needham . Denial of service. Commun. ACM
http://iet.metastore.ingenta.com/content/journals/10.1049/el_19940697
Loading

Related content

content/journals/10.1049/el_19940697
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address