The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Several practical protocols for authentication and key exchange

Author

Chae Hoon Lim,Pil Joong Lee

Entry type

techreport

Abstract

It is often desirable to achieve mutual authentication and secret key exchange in the same protocol. Two kinds of approaches may be considered for this purpose ; authentication after key exchange using symetric algorithms and Diffie-Hellman type key exchange protocols, and key exchange after authentication by modifying 3-move identification schemes based on zero-knowledge technique. This letter presents several such protocols by each approach.

Date

1995

Address

Pohang, South Korea

Booktitle

Information Processing Letters

Institution

Pohang University of Science and Technology

Key alpha

lim

Publication Date

2001-01-01

Keywords

Algorithms; Cryptography; Authentication; Key exchange

BibTex-formatted data

To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.