<html>
<body>
<font size=3>It may help those doubters if we now briefly explain how EKE
accomplishes a) and b).<br><br>
<blockquote type=cite class=cite cite="">> For the benefit of me and
others reading this thread, can you briefly<br>
> explain how you would deploy EKE in a browser to defeat MitM
?<br><br>
By ensuring that the man in the middle:<br><br>
a) Ends up not in the possession of any authentication
credentials<br><br>
b) Can neither understand nor usefully modify the conversation they are
proxying.</blockquote><br>
I'm sure everyone understands how an authenticated public key
accomplishes a) and b), so there is no need to read on.<br><br>
Cordially, Joaquin<br><br>
<br><br>
<br><br>
<br>
a) The authentication credentials are encrypted with public keys, so that
only the intended recipient can decrypt* them.<br><br>
b) The conversation is encrypted with public keys, or with a session key
exchanged using public keys, so that only the intended recipient can
understand* and only the sender can modify*.<br><br>
<br>
* yeah, yeah: easily, soon enough to matter.<br>
</font></body>
</html>