Information | |
---|---|
has gloss | eng: The interlock protocol, as described by Ron Rivest and Adi Shamir, was designed to frustrate eavesdropper attack against two parties that use an anonymous key exchange protocol to secure their conversation. A further paper proposed using it as an authentication protocol, which was subsequently broken. |
lexicalization | eng: interlock protocol |
instance of | c/Cryptographic attacks |
Lexvo © 2008-2025 Gerard de Melo. Contact Legal Information / Imprint