Password-based Authenticated Key Exchange at the Cost of Diffie-Hellman

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=Tj6ZQqMWYx4



Duration: 57:30
827 views
9


Public-key Cryptography was born in the 1970s with the work of Diffie and Hellman where they defined and realized a foundational primitive called key exchange. In key exchange, two parties ΓÇô Alice and Bob ΓÇô who have never met each other before, can exchange messages over a public channel and agree on a shared secret key! Although the original proposal of Diffie and Hellman is secure only against passive eavesdropping adversaries, much effort has since been devoted to developing key-exchange protocols resisting active adversaries (this is also called the ΓÇ£authenticated key exchangeΓÇ¥ problem). Active adversaries can not only listen in on the communication channel, but also interfere with it arbitrarily -- modifying, inserting or deleting messages, but also impersonating the communicating entities. To resist such malice, it is necessary for Alice and Bob to share some prior, common setup information. A variety of setup assumptions have been considered in the literature. In this talk, I will focus on a very realistic and extremely challenging setting ΓÇô one where Alice and Bob share a low-entropy password (think of an ATM pin, or a computer login password). Such a password has too little entropy to be cryptographically useful, yet we will present protocols that use the shared password to ΓÇ£bootstrapΓÇ¥ a cryptographically strong shared key. Furthermore, our protocol will expend essentially the same amount of resources as the original Diffie-Hellman protocol, while also offering protection against active adversaries. Thus, in a sense, we obtain authenticated key exchange ΓÇ£for freeΓÇ¥ in the challenging password-based setting. This is joint work with Jonathan Katz (UMD).




Other Videos By Microsoft Research


2016-08-16Reputational Bargaining Under Knowledge of Rationality
2016-08-16We Will be Right With You: Managing Customers Expectations with Vague Promises and Cheap Talk
2016-08-16Information That Matters: Investigating Relevance of Entities in Social Media Networks
2016-08-16Efficient Bayesian Algorithmic Mechanism Design
2016-08-16Extreme Learning Machine: Learning Without Iterative Tuning
2016-08-16Extracting Knowledge from Networks: Rumors, Superstars, and Communities
2016-08-16Electrical Flows and Laplacian Systems: A New Tool for Graph Algorithms
2016-08-16Limit Theorems in Pseudorandomness and Learning Theory
2016-08-16Empirical Software Engineering, Version 2.0
2016-08-16A Master Bijection for Planar Maps, and Its Applications
2016-08-16Password-based Authenticated Key Exchange at the Cost of Diffie-Hellman
2016-08-16Generalized Identity-Based Encryption
2016-08-16Cryptography with Weak, Noisy, Leaky and Tempered Keys
2016-08-16Electrical Flows and Laplacian Systems: A New Tool for Graph Algorithms
2016-08-16Broadcast Based Peer Review in Open Source Software Development Projects
2016-08-16Optimization under Uncertainty: Understanding the Correlation Gap
2016-08-16Computational Social Choice: Algorithmic, Strategic, and Combinatorial Aspects
2016-08-16Harvesting and Querying the World's Knowledge
2016-08-16The FT-Mollification Method
2016-08-16Getting More: How to Negotiate to Achieve Your Goals in the Real World
2016-08-16HPC Virtual Worlds: Experimental Black Hole Dynamics on Parallel Computers



Tags:
microsoft research