Authentication and authenticated key exchanges

@article{Diffie1992AuthenticationAA,
  title={Authentication and authenticated key exchanges},
  author={W. Diffie and P. V. Oorschot and M. Wiener},
  journal={Designs, Codes and Cryptography},
  year={1992},
  volume={2},
  pages={107-125}
}
We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques. A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protocols. The definition of a secure protocol is considered, and desirable characteristics of secure protocols are discussed. 
Entity Authentication and Key Distribution
TLDR
This work provides the first formal treatment of entity authentication and authenticated key distribution appropriate to the distributed environment and presents a definition, protocol, and proof that the protocol meets its goal, assuming only the existence of a pseudorandom function. Expand
Authenticated Multi-Party Key Agreement
TLDR
This work examines key agreement protocols providing key authentication, key confirmation and forward secrecy and presents a protocol providing the properties listed above. Expand
Designing Secure Key Exchange Protocols
TLDR
A number of formal techniques have been developed to help analyse protocols and have been useful in detecting errors, but it is still difficult to be certain that a particular protocol is correct. Expand
Simple authenticated key agreement algorithm
A password-based method is described which modifies the Diffie-Hellman key agreement protocol to provide user authentication. It is simpler than previously published schemes, prevents theExpand
The GN-authenticated key agreement
TLDR
Two protocols for the common key establishment are presented and the security of both protocols results from the elliptic curve discrete logarithm problem and their security proof follows from some well known definitions. Expand
Authenticated Key Exchange Protocol in One-Round
TLDR
The protocols are the first provably-secure one-round protocol for authenticated 2-party key exchange in the standard model that the message lengths are equal to the basic protocol. Expand
Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques
TLDR
This paper investigates security proofs for protocols that employ asymmetric (public-key) techniques to solve two problems: entity authentication and authenticated key transport, and results imply the security of some protocols standardized by ISO and NIST in the model proposed. Expand
A Secure Key Exchange and Mutual Authentication Protocol for Wireless Mobile Communications
We propose an efficient and secure mutual authentication and key exchange protocol suitable for applications using low-power mobile communications. It maintains the required level of security and hasExpand
A Secure Key Exchange and Mutual Authentication Protocol for Wireless Mobile Communications
  • Yijun He, Nan Xu, J. Li
  • Computer Science
  • The Second International Conference on Availability, Reliability and Security (ARES'07)
  • 2007
We propose an efficient and secure mutual authentication and key exchange protocol suitable for applications using low-power mobile communications. It maintains the required level of security and hasExpand
Design and Analysis of Key Exchange Protocols via Secure Channel Identification
TLDR
The basic idea is to establish the minimum cryptographic requirements in delivering a new session key, and to identify how these are achieved in the protocol under examination, to establish that the basic properties exist. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 34 REFERENCES
How to Keep Authenticity Alive in a Computer Network
TLDR
A cryptographic scheme that allows to ensure the ongoing authenticity and security of connections in a computer network by combining a zero-knowledge authentication and a public key exchange protocol is presented. Expand
How to expose an eavesdropper
TLDR
A new protocol for establishing secure communications over an insecure communications charmel in the absence of trusted third parties or authenticated keys is presented, which forces a potential eavesdropper to reveal his existence by modifying and seriously garbling the communication. Expand
Limitations of challenge-response entity authentication
We consider two basic versions of the challenge-response authentication protocol, and exhibit both a method of attack and a simple modification preventing such attacks. We go on to consider threeExpand
An Identity-Based Key-Exchange Protocol
TLDR
An identity-based approach to the distribution of cryptographic keys is proposed, which is simple and applicable to networks of arbitrary size and can, furthermore, be extended at will. Expand
Systematic Design of Two-Party Authentication Protocols
TLDR
A new authenticated exchange protocol is presented which is both provably secure and highly efficient and practical, and prevents chosen plaintext or ciphertext attacks on the cryptosystem. Expand
Timestamps in key distribution protocols
TLDR
It is shown that key distribution protocols with timestamps prevent replays of compromised keys and have the additional benefit of replacing a two-step handshake. Expand
A logic of authentication
TLDR
This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols. Expand
A public key cryptosystem and a signature scheme based on discrete logarithms
TLDR
A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields. Expand
Identity-Based Cryptosystems and Signature Schemes
TLDR
A novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other’s signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party. Expand
The Kerberos Network Authentication Service (V5)
TLDR
This document gives an overview and specification of Version 5 of the protocol for the Kerberos network authentication system, presently in production use at MIT's Project Athena, and at other Internet sites. Expand
...
1
2
3
4
...