{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T06:44:27Z","timestamp":1742798667803,"version":"3.30.2"},"reference-count":13,"publisher":"Association for Computing Machinery (ACM)","issue":"3","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGOPS Oper. Syst. Rev."],"published-print":{"date-parts":[[1995,7]]},"abstract":"In their recent paper, \"Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks,\" Bellovin and Merritt propose a novel and elegant method for safeguarding weak passwords. This paper discusses a possible weakness in the proposed protocol, develops some enhancements and simplifications, and provides a security analysis of the resultantminimal<\/jats:italic>EKE protocol. In addition, the basic 2-party EKE model is extended to the 3-party setting; this yields a protocol with some interesting properties. Most importantly, this paper illustrates, once again, the subtlety associated with designing password-based protocols.<\/jats:p>","DOI":"10.1145\/206826.206834","type":"journal-article","created":{"date-parts":[[2004,10,12]],"date-time":"2004-10-12T15:03:40Z","timestamp":1097593420000},"page":"22-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":185,"title":["Refinement and extension of encrypted key exchange"],"prefix":"10.1145","volume":"29","author":[{"given":"Michael","family":"Steiner","sequence":"first","affiliation":[{"name":"Communications and Computer Science Department, IBM Zfirich Research Laboratory, CH-8803 Riischlikon, Switzerland"}]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[{"name":"Communications and Computer Science Department, IBM Zfirich Research Laboratory, CH-8803 Riischlikon, Switzerland"}]},{"given":"Michael","family":"Waidner","sequence":"additional","affiliation":[{"name":"Communications and Computer Science Department, IBM Zfirich Research Laboratory, CH-8803 Riischlikon, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[1995,7]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/882488.884178"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168618"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/188105.188164"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/358722.358740"},{"key":"e_1_2_1_6_1","author":"Diffie W.","year":"1976","unstructured":"[ 6 ] W. Diffie and M. Hellman , New Directions in Cryptography, IEEE Transactions on Information Theory , November 1976 . [6] W. Diffie and M. Hellman, New Directions in Cryptography, IEEE Transactions on Information Theory, November 1976.","journal-title":"New Directions in Cryptography, IEEE Transactions on Information Theory"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168592"},{"key":"e_1_2_1_8_1","doi-asserted-by":"crossref","DOI":"10.6028\/NBS.FIPS.11-1-Sep30\/1977","volume-title":"Federal Information Processing Standards","author":"National Bureau of Standards","year":"1977","unstructured":"[ 8 ] National Bureau of Standards , Federal Information Processing Standards , National Bureau of Standards , Publication 46, 1977 . [8] National Bureau of Standards, Federal Information Processing Standards, National Bureau of Standards, Publication 46, 1977."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/359657.359659"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/24592.24593"},{"key":"e_1_2_1_11_1","volume-title":"Internet DRAFT","author":"Rivest R.","year":"1991","unstructured":"[ 11 ] R. Rivest , The MD5 Message Digest Algorithm , Internet DRAFT , July 1991 . [11] R. Rivest, The MD5 Message Digest Algorithm, Internet DRAFT, July 1991."},{"key":"e_1_2_1_12_1","volume-title":"Applied Cryptography (Section 12.2)","author":"Schneier B.","year":"1994","unstructured":"[ 12 ] B. Schneier , Applied Cryptography (Section 12.2) , New York, NY : Wiley , 1994 . [12] B. Schneier, Applied Cryptography (Section 12.2), New York, NY: Wiley, 1994."},{"key":"e_1_2_1_13_1","volume-title":"Security for Computer Networks","author":"Davies D.","year":"1989","unstructured":"[ 13 ] D. Davies and W. Price , Security for Computer Networks , 2 nd Edition, New York, NY : Wiley , 1989 . [13] D. Davies and W. Price, Security for Computer Networks, 2nd Edition, New York, NY: Wiley, 1989.","edition":"2"},{"key":"e_1_2_1_14_1","volume-title":"Fall","author":"Mao W.","year":"1994","unstructured":"[ 14 ] W. Mao and C. Boyd , Cryptographic Key Establishment Secure Against Exhaustive Key Search DRAFT, submitted to 1995 IEEE Symposium on Research in Security and Privacy, available from wenho@comms.ee.man.ac.uk , Fall 1994 . [14] W. Mao and C. Boyd, Cryptographic Key Establishment Secure Against Exhaustive Key Search DRAFT, submitted to 1995 IEEE Symposium on Research in Security and Privacy, available from wenho@comms.ee.man.ac.uk, Fall 1994."}],"container-title":["ACM SIGOPS Operating Systems Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/206826.206834","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T23:59:51Z","timestamp":1734566391000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/206826.206834"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,7]]},"references-count":13,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1995,7]]}},"alternative-id":["10.1145\/206826.206834"],"URL":"https:\/\/doi.org\/10.1145\/206826.206834","relation":{},"ISSN":["0163-5980"],"issn-type":[{"type":"print","value":"0163-5980"}],"subject":[],"published":{"date-parts":[[1995,7]]},"assertion":[{"value":"1995-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}