Abstract

We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques. A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protocols. The definition of a secure protocol is considered, and desirable characteristics of secure protocols are discussed.

Description

SpringerLink - Designs, Codes and Cryptography, Volume 2, Number 2

Links and resources

Tags

community

  • @fohv
  • @lysander07
  • @dblp
@lysander07's tags highlighted