Global Information Lookup Global Information

Authenticated Key Exchange information


Authenticated Key Exchange (AKE), Authenticated Key Agreement (AKA) or Authentication and Key Establishment(AKE) is the exchange or creation of a session key in a key exchange protocol which also authenticates the identities of parties involved in key exchange.[1] AKE typically occurs at the beginning of a communication session.[2] Features of AKE protocols include determining which keys already exist and can be used, how new keys will be generated, and how many users the protocol is applicable to.[2]

AKE protocols make use of long term keys which exist prior to the protocol, and session keys, which are typically symmetric keys established during the execution of the protocol.[2] AKE protocols can be divided into four categories, based on the different types of long term keys used :[2]

  1. Pre-Shared keys
  2. Public-private key pairs
  3. Identity-based keys
  4. Passwords

The use of Transport Layer Security (TLS) to secure HTTP connections is perhaps the most widely deployed AKE protocol.[3]

  1. ^ Diffie, W.; van Oorschot, P.; Wiener, M. (June 1992). "Authentication and authenticated key exchanges". Designs, Codes and Cryptography. 2 (2): 107–125. CiteSeerX 10.1.1.59.6682. doi:10.1007/BF00124891. S2CID 7356608.
  2. ^ a b c d Boyd, C., Mathuria, A., & Stebila, D. (2020). Protocols for authentication and Key Establishment. Springer Berlin Heidelberg.
  3. ^ Eric Rescorla (August 2018). "The Transport Layer Security (TLS) Protocol Version 1.3". Mozilla. The Internet Engineering Task Force. Archived from the original on 14 May 2021.

and 21 Related for: Authenticated Key Exchange information

Request time (Page generated in 0.8523 seconds.)

Authenticated Key Exchange

Last Update:

Authenticated Key Exchange (AKE), Authenticated Key Agreement (AKA) or Authentication and Key Establishment(AKE) is the exchange or creation of a session...

Word Count : 235

Key authentication

Last Update:

the keys at the time of authentication. The simplest solution for this kind of problem is for the two concerned users to communicate and exchange keys. However...

Word Count : 584

Oblivious pseudorandom function

Last Update:

Password-Authenticated Key Exchange or PAKE. In basic authentication, the server learns the user's password during the course of the authentication. If the...

Word Count : 3333

Password Authenticated Key Exchange by Juggling

Last Update:

The Password Authenticated Key Exchange by Juggling (or J-PAKE) is a password-authenticated key agreement protocol, proposed by Feng Hao and Peter Ryan...

Word Count : 1501

Key exchange

Last Update:

Key exchange (also key establishment) is a method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic...

Word Count : 1394

Encrypted key exchange

Last Update:

Encrypted Key Exchange (also known as EKE) is a family of password-authenticated key agreement methods described by Steven M. Bellovin and Michael Merritt...

Word Count : 389

Internet Key Exchange

Last Update:

establish a secure authenticated communication channel by using the Diffie–Hellman key exchange algorithm to generate a shared secret key to encrypt further...

Word Count : 2339

Simultaneous Authentication of Equals

Last Update:

cryptography, Simultaneous Authentication of Equals (SAE) is a password-based authentication and password-authenticated key agreement method. SAE is a...

Word Count : 628

Authenticated encryption

Last Update:

of authenticated encryption modes. In 2015, ChaCha20-Poly1305 is added as an alternative AE construction to GCM in IETF protocols. Authenticated encryption...

Word Count : 2085

Internet Security Association and Key Management Protocol

Last Update:

framework for authentication and key exchange and is designed to be key exchange independent; protocols such as Internet Key Exchange (IKE) and Kerberized...

Word Count : 572

SPEKE

Last Update:

Exponential Key Exchange) is a cryptographic method for password-authenticated key agreement. The protocol consists of little more than a Diffie–Hellman key exchange...

Word Count : 1005

Pake

Last Update:

Pake may refer to: Password-authenticated key exchange (PAKE) Pākē, Hawaiian language term for Chinese in Hawaii Pake, California Páké, alternative name...

Word Count : 69

HMAC

Last Update:

expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving...

Word Count : 2305

Forward secrecy

Last Update:

Oorschot, Paul C.; Wiener, Michael J. (June 1992). "Authentication and Authenticated Key Exchanges" (PDF). Designs, Codes and Cryptography. 2 (2): 107–125...

Word Count : 2980

Extensible Authentication Protocol

Last Update:

Internet Key Exchange v. 2 (EAP-IKEv2) is an EAP method based on the Internet Key Exchange protocol version 2 (IKEv2). It provides mutual authentication and...

Word Count : 4172

Secure Remote Password protocol

Last Update:

Secure Remote Password protocol (SRP) is an augmented password-authenticated key exchange (PAKE) protocol, specifically designed to work around existing...

Word Count : 3404

IPsec

Last Update:

Association and Key Management Protocol (ISAKMP) provides a framework for authentication and key exchange, with actual authenticated keying material provided...

Word Count : 5081

MIKEY

Last Update:

(MIKEY-IBAKE): Identity-Based Authenticated Key Exchange (IBAKE) Mode of Key Distribution in Multimedia Internet KEYing (MIKEY). MIKEY-IBAKE is defined...

Word Count : 1061

Message authentication code

Last Update:

keyed hash, message authentication code, or protected checksum. Informally, a message authentication code system consists of three algorithms: A key generation...

Word Count : 1781

Secure Scuttlebutt

Last Update:

peers. SSB peers exchange asymmetric keys and establish authenticated connections between each other using an Authenticated Key Exchange protocol, Secret...

Word Count : 985

MQV

Last Update:

(Menezes–Qu–Vanstone) is an authenticated protocol for key agreement based on the Diffie–Hellman scheme. Like other authenticated Diffie–Hellman schemes,...

Word Count : 1745

PDF Search Engine © AllGlobal.net