February 26, 2002
Practical Aspects of Modern Cryptography
3
Encrypted Key Exchange
nWe know how Alice and Bob can communicate securely if they share a strong (128-bit) private key or if one has a public key known to the other.
nSuppose that Alice and Bob share only a short (potentially searchable) password.
nRather than using just this weak password, Alice and Bob can use this weak password to bootstrap a strong key.