Authentication and authenticated key exchanges

  title={Authentication and authenticated key exchanges},
  author={W. Diffie and P. V. Oorschot and Michael J. Wiener},
  journal={Designs, Codes and Cryptography},
  • W. Diffie, P. V. Oorschot, Michael J. Wiener
  • Published 1992
  • Mathematics, Computer Science
  • Designs, Codes and Cryptography
  • We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques. A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protocols. The definition of a secure protocol is considered, and desirable characteristics of secure protocols are discussed. 

    Topics from this paper.

    Entity Authentication and Key Distribution
    • 1,639
    • PDF
    Authenticated Multi-Party Key Agreement
    • 210
    Designing Secure Key Exchange Protocols
    • 23
    The OAKLEY Key Determination Protocol
    • 230
    • PDF


    Publications referenced by this paper.
    How to expose an eavesdropper
    • 153
    • PDF
    An Identity-Based Key-Exchange Protocol
    • 210
    • PDF
    Limitations of challenge-response entity authentication
    • 65
    Systematic Design of Two-Party Authentication Protocols
    • 163
    • PDF
    Timestamps in key distribution protocols
    • 765
    • PDF
    A logic of authentication
    • 1,303
    • PDF
    Identity-Based Cryptosystems and Signature Schemes
    • 6,144
    • PDF
    The Kerberos Network Authentication Service (V5)
    • 1,331
    • PDF