Interactive method for two or more parties to establish cryptographic keys based on one or more party's knowledge of a password