Interlock Protocol

The interlock protocol, as described by Ron Rivest and Adi Shamir, was designed to frustrate eavesdropper attack against two parties that use an anonymous key exchange protocol to secure their conversation. A further paper proposed using it as an authentication protocol, which was subsequently broken.

Read more about Interlock Protocol:  Brief History, How It Works, The Bellovin/Merritt Attack, Forced-Latency Interlock Protocol

Other articles related to "interlock protocol":

Forced-Latency Interlock Protocol
... A modified Interlock Protocol can require B (the server) to delay all responses for a known duration A B Ka-------------> ...