@misc{rfc6124, series = {Request for Comments}, number = 6124, howpublished = {RFC 6124}, publisher = {RFC Editor}, doi = {10.17487/RFC6124}, url = {https://www.rfc-editor.org/info/rfc6124}, author = {Scott Fluhrer and Glen Zorn and Yaron Sheffer and Hannes Tschofenig}, title = {{An EAP Authentication Method Based on the Encrypted Key Exchange (EKE) Protocol}}, pagetotal = 33, year = 2011, month = feb, abstract = {The Extensible Authentication Protocol (EAP) describes a framework that allows the use of multiple authentication mechanisms. This document defines an authentication mechanism for EAP called EAP-EKE, based on the Encrypted Key Exchange (EKE) protocol. This method provides mutual authentication through the use of a short, easy to remember password. Compared with other common authentication methods, EAP-EKE is not susceptible to dictionary attacks. Neither does it require the availability of public-key certificates. This document is not an Internet Standards Track specification; it is published for informational purposes.}, }