Today, protocols considered part of PAKE are among the most common cryptographic primitives due to the PAKE family of protocols, as the distribution of the public key is necessary to perform high-level tasks, such as encryption and MAC calculation. When it comes to important agreements, the parties need the information that each of the parties would have. As is well known, the most common approach is currently the key to raspredeleraspredeleniyu preliminary exchange of public keys between parties, then send encrypted cryptographic keys. There are many in the accuracy of such protocols and similar ones that are normally based on the Diffie-Hellman protocol. However, all of these reports have a common fundamental error - they are faced with listening and offer no mechanism for authentication sites, let alone confirmation of the possession of the key to counter the imposition of traffic. Thus, if the certificate containing the public key of the second part has been intercepted in one way or another and replaced by its own intruder, if the type certificate of the recipient is not really known, listen without being spotted. Similarly, the applicability of the DE PAKE protocol family may be justified by the interactivity requirements when spreading the attackers` password, as opposed to absolute in the case of non-interactive authentication for conventional protocols based on the diffie-Hellman protocol. Key calling, verified by the password, is a process in which a customer receives a static key in a password-based negotiation with a server that knows the password data. B for example the Ford and Kaliski methods. In the strictest configuration, a party uses only one password associated with N servers (two or more) to retrieve a static key. This is completed in such a way as to protect the password (and key) even if the server`s N-1 is completely compromised. In cryptography, a key method of agreement with password authentication is an interactive method for two or more parties to set up cryptographic keys based on the knowledge of a password by one or more parties. The password is a process in which a customer retrieves a static key in a password-based negotiation with a server that knows the data associated with the password.
With this type of user protocols on the recovery of the necessary data from the server after they authenticate each other by password.