Designs, Codes and Cryptography

, Volume 2, Issue 2, pp 107–125

Authentication and authenticated key exchanges

  • Whitfield Diffie
  • Paul C. Van Oorschot
  • Michael J. Wiener
Article

DOI: 10.1007/BF00124891

Cite this article as:
Diffie, W., Van Oorschot, P.C. & Wiener, M.J. Des Codes Crypt (1992) 2: 107. doi:10.1007/BF00124891

Abstract

We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques. A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protocols. The definition of a secure protocol is considered, and desirable characteristics of secure protocols are discussed.

Copyright information

© Kluwer Academic Publishers 1992

Authors and Affiliations

  • Whitfield Diffie
    • 1
  • Paul C. Van Oorschot
    • 2
  • Michael J. Wiener
    • 2
  1. 1.Sun MicrosystemsMountain ViewUSA
  2. 2.Bell-Northern ResearchOttawaCanada