发明名称 Cryptographic methods for remote authentication
摘要 Methods are described for two parties to use a small shared secret (S) to mutually authenticate one another other over an insecure network. The methods are secure against off-line dictionary attack and incorporate an otherwise unauthenticated public key distribution system. One embodiment uses two computers Alice and Bob, and a Diffie-Hellman exponential key exchange in a large prime-order finite group. Both parties choose the same generator of the group (g) as a function of S. Alice chooses a random number RA, and sends g<R><A >to Bob. Bob chooses a random RB, sends g<R><B >to Alice. Both compute a shared key K=g<(R><A><R><B><)>. Each party insures that K is a generator of the group, verifies that the other knows K, and then uses K as an authenticated key. Constraints are described to prevent passive and active attacks. An extension is described where Alice proves knowledge of S to Bob who knows only a one-way transformation of S. These methods establish a secure, authenticated network session using only an easily memorized password.
申请公布号 US6792533(B2) 申请公布日期 2004.09.14
申请号 US20020087048 申请日期 2002.03.01
申请人 PHOENIX TECHNOLOGIES LTD. 发明人 JABLON DAVID P.
分类号 H04L9/08;(IPC1-7):H04L9/30 主分类号 H04L9/08
代理机构 代理人
主权项
地址