[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Weak authentication in Xauth and IKE
On Fri, 20 Aug 1999, Jianying Zhou wrote:
> > After the adversary computes k (knowing everything) she decrypts
>
>
> How does the adversary know everything to computer k ???
> The initiator uses the pw shared with R (not M) to compute s
> and derive k. Does the adversary know pw in advance?
>
Isn't this exactly the case, if people start using the dreaded
group-pre-shared-secret, i.e. assign a single shared-secret to all their
dial-in customers?
jan
--
Jan Vilhuber vilhuber@cisco.com
Cisco Systems, San Jose (408) 527-0847
Follow-Ups:
References: