February 26, 2002
Practical Aspects of Modern Cryptography
4
Encrypted Key Exchange
n
Alice and Bob share weak password
P
.
n
Let
C
be a symmetric cipher agreed upon by
Alice and Bob.
n
Alice begins by generating a public/private
key pair
(E,D)
.
n
Alice sends Bob
C
P
(E)
.
n
Bob generates a random symmetric key K
and sends Alice
C
P
(E(K))
.