We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques. A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protocols. The definition of a secure protocol is considered, and desirable characteristics of secure protocols are discussed.

Additional Metadata
Persistent URL dx.doi.org/10.1007/BF00124891
Journal Designs, Codes and Cryptography
Diffie, W. (Whitfield), Van Oorschot, P, & Wiener, M.J. (Michael J.). (1992). Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 2(2), 107–125. doi:10.1007/BF00124891