Skip to main content

Part of the book series: UNITEXT ((UNITEXTINF))

  • 697 Accesses

Riassunto

Come abbiamo visto nel Capitolo 11 esistono diversi protocolli di autenticazione con sicurezza dimostrabile per scambio di chiavi e/o autenticazione (mutua), utilizzando informazioni condivise nella forma di chiavi crittografiche ad alto contenuto entropico. È naturale chiedersi cosa si può sperare di ottenere quando l’informazione condivisa tra le due parti ha basso contenuto entropico, ad esempio se essa è costituita da una parola scelta in un dizionario con “pochi” elementi.

Urlò così forte che Alice non poté fare a meno di dire: »Zitto! Lo sveglierai con tutto questo rumore!«. »Be’, che parli a fare di svegliarlo« disse Dammelo, »se non sei altro che una delle cose del suo sogno«. »Io sono vera!« disse Alice e iniziò a piangere. »Non diventerai neanche un pochino più vera piangendo« osservò Dimmelo; »non c’é niente da piangere«. Lewis Carroll, Attraverso lo Specchio e quel che Alice vi trovò [Car71]

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Letture consigliate

  1. Michel Abdalla e David Pointcheval. “Simple Password-Based Encrypted Key Exchange Protocols”. In: CT-RSA. 2005, pp. 191–208.

    Google Scholar 

  2. Burton H. Bloom. “Space/Time Trade-offs in Hash Coding with Allowable Errors”. In: Commun. ACM 13.7 (1970), pp. 422–426.

    Google Scholar 

  3. Steven M. Bellovin e Michael Merritt. “Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks”. In: IEEE Symposium on Security and Privacy. 1992, pp. 72–84.

    Google Scholar 

  4. Steven M. Bellovin e Michael Merritt. “Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise”. In: ACM Conference on Computer and Communications Security. 1993, pp. 244–250.

    Google Scholar 

  5. Victor Boyko, Philip D. MacKenzie e Sarvar Patel. “Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman”. In: EU-ROCRYPT. 2000, pp. 156–171.

    Google Scholar 

  6. Mihir Bellare, David Pointcheval e Phillip Rogaway. “Authenticated Key Exchange Secure against Dictionary Attacks”. In: EUROCRYPT. 2000, pp. 139–155.

    Google Scholar 

  7. Lewis Carroll. Through the Looking-Glass, and What Alice Found There. Edizione Italiana Einaudi. Traduzione di Alessandro Ceni. Mac Millan & Co., 1871.

    Google Scholar 

  8. David C. Feldmeier e Philip R. Karn. “UNIX Password Security — Ten Years Later”. In: CRYPTO. 1989, pp. 44–63.

    Google Scholar 

  9. Oded Goldreich e Yehuda Lindell. “Session-Key Generation Using Human Passwords Only”. In: J. Cryptology 19.3 (2006), pp. 241–340.

    Google Scholar 

  10. Jonathan Katz, Rafail Ostrovsky e Moti Yung. “Efficient and secure authenticated key exchange using weak passwords”. In: J. ACM 57.1 (2009).

    Google Scholar 

  11. Jonathan Katz e Vinod Vaikuntanathan. “Round-Optimal Password-Based Authenticated Key Exchange”. In: TCC. 2011, pp. 293–310.

    Google Scholar 

  12. Leslie Lamport. “Password Authentification with Insecure Communication”. In: Commun. ACM 24.11 (1981), pp. 770–772.

    Google Scholar 

  13. Michael Luby e Charles Rackoff. “A Study of Password Security”. In: J. Cryptology 1.3 (1989), pp. 151–158.

    Google Scholar 

  14. Philip D. MacKenzie, Sarvar Patel e Ram Swaminathan. “Password-Authenticated Key Exchange Based on RSA”. In: ASIACRYPT. 2000, pp. 599–613.

    Google Scholar 

  15. Robert Morris e Ken Thompson. “Password Security — A Case History”. In: Commun. ACM 22.11 (1979), pp. 594–597.

    Google Scholar 

  16. Sarvar Patel. “Number Theoretic Attacks on Secure Password Schemes”. In: IEEE Symposium on Security and Privacy. 1997, pp. 236–247.

    Google Scholar 

  17. Dennis Ritchie e Ken Thompson. “The UNIX Time-Sharing System”. In: Commun. ACM 17.7 (1974), pp. 365–375.

    Google Scholar 

  18. Thomas D. Wu. “The Secure Remote Password Protocol”. In: NDSS. 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Italia

About this chapter

Cite this chapter

Venturi, D. (2012). Password in crittografia. In: Crittografia nel Paese delle Meraviglie. UNITEXT(). Springer, Milano. https://doi.org/10.1007/978-88-470-2481-6_12

Download citation

  • DOI: https://doi.org/10.1007/978-88-470-2481-6_12

  • Publisher Name: Springer, Milano

  • Print ISBN: 978-88-470-2480-9

  • Online ISBN: 978-88-470-2481-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics