Article,

Authentication and authenticated key exchanges

, , and .
Designs, Codes and Cryptography, (1992)
DOI: 10.1007/BF00124891

Abstract

We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques. A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protocols. The definition of a secure protocol is considered, and desirable characteristics of secure protocols are discussed.

Tags

Users

  • @fohv
  • @lysander07

Comments and Reviews