SEMINAR

Secure Communications using a Low Entropy Secret

Michael Scott

Department of Computer Science and Statistics
University of Southern Mississippi

ABSTRACT

Alice & Bob want to communicate on the phone in private. The only mutual secret they share is "Sparky", the name of Alice's dog. The phone line is tapped by Eve, who is able to intercept the call at the telephone exchange. Eve has a very large supercomputer at her disposal, and a database of a million favorite passwords, which includes "Sparky".

Can Alice & Bob communicate safely and frustrate Eve? It seems unlikely, but in fact the answer is Yes. Come and find out how.

WHERE: TEC 205

WHEN(day): Friday, March 2nd, 2001

WHEN(time): 2:00pm

EVERYBODY IS INVITED