翻訳と辞書
Words near each other
・ Encyclopedia of Laser Physics and Technology
・ Encyclopedia of Library and Information Sciences
・ Encyclopedia of Life
・ Encyclopedia of Life Sciences
・ Encyclopedia of Life Support Systems
・ Encyclopedia of Mathematics
・ Encyclopedia of Mathematics (James Tanton)
・ Encyclopedia of Modern Ukraine
・ Encyclopedia of Mormonism
・ Encyclopedia of Motherhood
・ Encryphodes aenictopa
・ Encryphodes ethiopella
・ Encrypt (film)
・ Encrypted filesystem
・ Encrypted function
Encrypted key exchange
・ Encrypted Media Extensions
・ Encrypted Title Key
・ Encrypting File System
・ Encrypting PIN Pad
・ Encryption
・ Encryption (album)
・ Encryption ban proposal in the United Kingdom
・ Encryption by date
・ Encryption layer in storage stack
・ Encryption software
・ Encryptr
・ Encs
・ Encsencs
・ Encuentra24


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Encrypted key exchange : ウィキペディア英語版
Encrypted key exchange
Encrypted Key Exchange (also known as EKE) is a family of password-authenticated key agreement methods described by Steven M. Bellovin and Michael Merritt. Although several of the forms of EKE in this paper were later found to be flawed , the surviving, refined, and enhanced forms of EKE effectively make this the first method to amplify a shared password into a shared key, where the shared key may subsequently be used to provide a zero-knowledge password proof or other functions.
In the most general form of EKE, at least one party encrypts an ephemeral (one-time) public key using a password, and sends it to a second party, who decrypts it and uses it to negotiate a shared key with the first party.
A second paper describes Augmented-EKE, and introduced the concept of augmented password-authenticated key agreement for client/server scenarios. Augmented methods have the added goal of ensuring that password verification data stolen from a server cannot be used by an attacker to masquerade as the client, unless the attacker first determines the password (e.g. by performing a brute force attack on the stolen data).
A version of EKE based on Diffie-Hellman, known as DH-EKE, has survived attack and has led to improved variations, such as the PAK family of methods in IEEE P1363.2.
With the US patent on EKE expiring in late 2011, an EAP authentication method using EKE was published as an IETF RFC. The EAP method uses the Diffie-Hellman variant of EKE.
==Patents==
, owned by Lucent, describes the initial EKE method. It expired in October 2011.

, owned by Lucent, describes the augmented EKE method. It expired in August 2013.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Encrypted key exchange」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.