Efficient and practical DHEKE protocols

Chun Li Lin, Hung Min Sun, Tzone-Lih Hwang

Research output: Contribution to journalArticle

3 Citations (Scopus)

Abstract

In 1992, Bellovin and Merritt proposed Encrypted Key Exchange (EKE) protocols for preventing dictionary attacks on weak chosen passwords. In 1995, Steiner, Tsudik, and Waidner proposed a minimal DHEKE protocol which simplified the Diffie-Hellman based one of Bellovin and Merritts' protocols. In this paper, we propose two improvements on the minimal DHEKE protocol. These two improvements can reduce the computational cost further.

Original languageEnglish
Pages (from-to)41-47
Number of pages7
JournalOperating Systems Review (ACM)
Volume35
Issue number1
DOIs
Publication statusPublished - 2001 Jan 1

Fingerprint

Glossaries
Costs

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Hardware and Architecture
  • Computer Networks and Communications

Cite this

Lin, Chun Li ; Sun, Hung Min ; Hwang, Tzone-Lih. / Efficient and practical DHEKE protocols. In: Operating Systems Review (ACM). 2001 ; Vol. 35, No. 1. pp. 41-47.
@article{ce26427594ed4eb7b1cd205af6f3c31f,
title = "Efficient and practical DHEKE protocols",
abstract = "In 1992, Bellovin and Merritt proposed Encrypted Key Exchange (EKE) protocols for preventing dictionary attacks on weak chosen passwords. In 1995, Steiner, Tsudik, and Waidner proposed a minimal DHEKE protocol which simplified the Diffie-Hellman based one of Bellovin and Merritts' protocols. In this paper, we propose two improvements on the minimal DHEKE protocol. These two improvements can reduce the computational cost further.",
author = "Lin, {Chun Li} and Sun, {Hung Min} and Tzone-Lih Hwang",
year = "2001",
month = "1",
day = "1",
doi = "10.1145/371455.371460",
language = "English",
volume = "35",
pages = "41--47",
journal = "Operating Systems Review (ACM)",
issn = "0163-5980",
publisher = "Association for Computing Machinery (ACM)",
number = "1",

}

Efficient and practical DHEKE protocols. / Lin, Chun Li; Sun, Hung Min; Hwang, Tzone-Lih.

In: Operating Systems Review (ACM), Vol. 35, No. 1, 01.01.2001, p. 41-47.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Efficient and practical DHEKE protocols

AU - Lin, Chun Li

AU - Sun, Hung Min

AU - Hwang, Tzone-Lih

PY - 2001/1/1

Y1 - 2001/1/1

N2 - In 1992, Bellovin and Merritt proposed Encrypted Key Exchange (EKE) protocols for preventing dictionary attacks on weak chosen passwords. In 1995, Steiner, Tsudik, and Waidner proposed a minimal DHEKE protocol which simplified the Diffie-Hellman based one of Bellovin and Merritts' protocols. In this paper, we propose two improvements on the minimal DHEKE protocol. These two improvements can reduce the computational cost further.

AB - In 1992, Bellovin and Merritt proposed Encrypted Key Exchange (EKE) protocols for preventing dictionary attacks on weak chosen passwords. In 1995, Steiner, Tsudik, and Waidner proposed a minimal DHEKE protocol which simplified the Diffie-Hellman based one of Bellovin and Merritts' protocols. In this paper, we propose two improvements on the minimal DHEKE protocol. These two improvements can reduce the computational cost further.

UR - http://www.scopus.com/inward/record.url?scp=33750673987&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33750673987&partnerID=8YFLogxK

U2 - 10.1145/371455.371460

DO - 10.1145/371455.371460

M3 - Article

VL - 35

SP - 41

EP - 47

JO - Operating Systems Review (ACM)

JF - Operating Systems Review (ACM)

SN - 0163-5980

IS - 1

ER -