"--", .
:
- The client computes H D by stitching the user password using S D
- The client computes K by hashing H D with S P
- The client encrypts all communication with the server using K
This scheme creates a random session key K based on the user's password.
A person in the middle could not get K without knowing the user's password (or H D , which should be kept secret), and therefore can not impersonate a server.
SLaks source
share