> From: [email protected]
> Subject: RFC 6628 on Efficient Augmented Password-Only Authentication and Key 
> Exchange for IKEv2
> Date: June 1, 2012 6:51:04 PM PDT
> To: [email protected], [email protected]
> Cc: [email protected]
> 
> 
> A new Request for Comments is now available in online RFC libraries.
> 
> 
>        RFC 6628
> 
>        Title:      Efficient Augmented Password-Only Authentication and 
>                    Key Exchange for IKEv2 
>        Author:     S. Shin, K. Kobara
>        Status:     Experimental
>        Stream:     IETF
>        Date:       June 2012
>        Mailbox:    [email protected], 
>                    [email protected]
>        Pages:      20
>        Characters: 45831
>        Updates/Obsoletes/SeeAlso:   None
> 
>        I-D Tag:    draft-shin-augmented-pake-15.txt
> 
>        URL:        http://www.rfc-editor.org/rfc/rfc6628.txt
> 
> This document describes an efficient augmented password-only
> authentication and key exchange (AugPAKE) protocol where a user
> remembers a low-entropy password and its verifier is registered in
> the intended server.  In general, the user password is chosen from a 
> small set of dictionary words that allows an attacker to perform 
> exhaustive searches (i.e., off-line dictionary attacks).  The AugPAKE 
> protocol described here is secure against passive attacks, active attacks, 
> and off-line dictionary attacks (on the obtained messages with 
> passive/active attacks), and also provides resistance to server compromise 
> (in the context of augmented PAKE security).  In addition, this document 
> describes how the AugPAKE protocol is integrated into the Internet Key 
> Exchange Protocol version 2 (IKEv2).  This document defines an 
> Experimental Protocol for the Internet community.
> 
> 
> EXPERIMENTAL: This memo defines an Experimental Protocol for the
> Internet community.  It does not specify an Internet standard of any
> kind. Discussion and suggestions for improvement are requested.
> Distribution of this memo is unlimited.

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to