nWe
know how Alice and Bob can communicate securely if they share a strong (128-bit) private
key or if one has a public key known to the other.
nSuppose
that Alice and Bob share only a short (potentially searchable)
password.
nRather
than using just this weak password, Alice and Bob can use this weak password
to bootstrap
a strong key.