I-D Action: draft-krawczyk-cfrg-opaque-00.txt

internet-drafts@ietf.org Fri, 28 September 2018 21:00 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: i-d-announce@ietf.org
Delivered-To: i-d-announce@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 23A89127133 for <i-d-announce@ietf.org>; Fri, 28 Sep 2018 14:00:08 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Subject: I-D Action: draft-krawczyk-cfrg-opaque-00.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 6.84.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <153816840803.26504.11974428256144251095@ietfa.amsl.com>
Date: Fri, 28 Sep 2018 14:00:08 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/i-d-announce/c5wyejRJffiyZBc21r7qU_xaqkg>
X-BeenThere: i-d-announce@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Internet Draft Announcements only <i-d-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i-d-announce/>
List-Post: <mailto:i-d-announce@ietf.org>
List-Help: <mailto:i-d-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Sep 2018 21:00:08 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.


        Title           : The OPAQUE Asymmetric PAKE Protocol
        Author          : Hugo Krawczyk
	Filename        : draft-krawczyk-cfrg-opaque-00.txt
	Pages           : 17
	Date            : 2018-09-28

Abstract:
   This draft describes the OPAQUE protocol, a secure asymmetric
   password authenticated key exchange (aPAKE) that supports mutual
   authentication in a client-server setting without any reliance on
   PKI.  OPAQUE is the first PKI-free aPAKE to accommodate secret salt
   and therefore is the first to be secure against pre-computation
   attacks upon server compromise.  In contrast, prior aPAKE protocols
   did not use salt and if they did, the salt was transmitted in the
   clear from server to user allowing for the building of targeted pre-
   computed dictionaries.  OPAQUE security has been proven by Jarecki et
   al.  (Eurocrypt 2018) in a strong and universally composable formal
   model of aPAKE security.  In addition, the protocol provides forward
   secrecy and the ability to hide the password from the server even
   during password registration.

   Strong security, good performance and an array of additional features
   make OPAQUE a natural candidate for practical use and for adoption as
   a standard.  To this end, this draft presents several optimized
   instantiations of OPAQUE and ways of integrating OPAQUE with TLS.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-krawczyk-cfrg-opaque/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-krawczyk-cfrg-opaque-00
https://datatracker.ietf.org/doc/html/draft-krawczyk-cfrg-opaque-00


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/