[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Weak authentication in Xauth and IKE



On Fri, 20 Aug 1999, Jianying Zhou wrote:
> > After the adversary computes k (knowing everything) she decrypts
> 
> 
> How does the adversary know everything to computer k ???
> The initiator uses the pw shared with R (not M) to compute s
> and derive k. Does the adversary know pw in advance?
> 
Isn't this exactly the case, if people start using the dreaded
group-pre-shared-secret, i.e. assign a single shared-secret to all their
dial-in customers?

jan
 --
Jan Vilhuber                                            vilhuber@cisco.com
Cisco Systems, San Jose                                     (408) 527-0847





Follow-Ups: References: