February 26, 2002
Practical Aspects of Modern Cryptography
4
Encrypted Key Exchange
nAlice and Bob share weak password P.
nLet C be a symmetric cipher agreed upon by Alice and Bob.
nAlice begins by generating a public/private key pair (E,D).
nAlice sends Bob CP(E).
nBob generates a random symmetric key K and sends Alice CP(E(K)).