We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques. A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protocols. The definition of a secure protocol is considered, and desirable characteristics of secure protocols are discussed.
Description
SpringerLink - Designs, Codes and Cryptography, Volume 2, Number 2
%0 Journal Article
%1 springerlink:10.1007/BF00124891
%A Diffie, Whitfield
%A Oorschot, Paul C.
%A Wiener, Michael J.
%D 1992
%I Springer Netherlands
%J Designs, Codes and Cryptography
%K cryptography www02 wwwbook wwwkap7
%P 107-125
%R 10.1007/BF00124891
%T Authentication and authenticated key exchanges
%U http://dx.doi.org/10.1007/BF00124891
%V 2
%X We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques. A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protocols. The definition of a secure protocol is considered, and desirable characteristics of secure protocols are discussed.
@article{springerlink:10.1007/BF00124891,
abstract = {We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques. A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protocols. The definition of a secure protocol is considered, and desirable characteristics of secure protocols are discussed.},
added-at = {2011-03-11T15:38:40.000+0100},
author = {Diffie, Whitfield and Oorschot, Paul C. and Wiener, Michael J.},
biburl = {https://www.bibsonomy.org/bibtex/2fd7393e386d9d52e25cc1e465ac40eab/lysander07},
description = {SpringerLink - Designs, Codes and Cryptography, Volume 2, Number 2},
doi = {10.1007/BF00124891},
interhash = {e3940c11188d8fe3409b8b9e591d673d},
intrahash = {fd7393e386d9d52e25cc1e465ac40eab},
issn = {0925-1022},
issue = {2},
journal = {Designs, Codes and Cryptography},
keyword = {Mathematics and Statistics},
keywords = {cryptography www02 wwwbook wwwkap7},
pages = {107-125},
publisher = {Springer Netherlands},
timestamp = {2011-03-11T15:38:40.000+0100},
title = {Authentication and authenticated key exchanges},
url = {http://dx.doi.org/10.1007/BF00124891},
volume = 2,
year = 1992
}