SEMINAR
Secure Communications using a Low Entropy Secret
Michael Scott
Department of Computer Science and Statistics
University of Southern Mississippi
ABSTRACT
Alice & Bob want to communicate on the phone in private. The only mutual secret they share is "Sparky", the name of Alice's dog. The phone line is tapped by Eve, who is able to intercept the call at the telephone exchange. Eve has a very large supercomputer at her disposal, and a database of a million favorite passwords, which includes "Sparky".
Can Alice & Bob communicate safely and frustrate Eve? It seems unlikely, but in fact the answer is Yes. Come and find out how.
WHERE: TEC 205
WHEN(day): Friday, March 2nd, 2001
WHEN(time): 2:00pm
EVERYBODY IS INVITED