1992 | WHITFIELD DIFFIE*, PAUL C. VAN OORSCHOT AND MICHAEL J. WIENER
Diffie, Van Oorschot, and Weiner present a protocol for two-party mutual authentication and authenticated key exchange, focusing on asymmetric techniques. They introduce the station-to-station (STS) protocol, which is simple and efficient, and analyze it in detail. The paper discusses the definition of secure protocols and their desirable characteristics.
The goal of an authentication protocol is to ensure that communicating parties know each other's true identities and to establish a shared secret key. This key can then be used for privacy, data integrity, or both. The paper examines the security of public-key based authentication protocols, both with and without key exchange. It focuses on two-party mutual authentication, not multi-party or one-way protocols. It assumes that cryptographic mechanisms are not vulnerable and analyzes attacks on protocols.
Many identification and authentication schemes use asymmetric techniques. Identity-based schemes rely on a trusted authority. Günther proposed an identity-based protocol using Diffie-Hellman and ElGamal. Okamoto and Tanaka proposed an identity-based protocol based on exponential key exchange and RSA. These protocols provide indirect or direct authentication, though some fields may be redundant.
Interactive identification protocols, such as those by Fiat and Shamir, use zero-knowledge proofs. These differ from authenticated key exchanges, as they do not provide keys for future communications.
Cryptographic protocol design is error-prone, with many protocols containing security flaws. Published protocols often have redundancies or inefficiencies. This motivates the search for simple, efficient protocols with minimal communications, cryptographic operations, and message fields.
The paper emphasizes the importance of linking key exchange with authentication to prevent attacks where an adversary takes over a communication line after authentication. It defines a secure protocol and discusses the STS protocol, examining its features and comparing it with related protocols. The paper concludes with principles important in designing authentication protocols.Diffie, Van Oorschot, and Weiner present a protocol for two-party mutual authentication and authenticated key exchange, focusing on asymmetric techniques. They introduce the station-to-station (STS) protocol, which is simple and efficient, and analyze it in detail. The paper discusses the definition of secure protocols and their desirable characteristics.
The goal of an authentication protocol is to ensure that communicating parties know each other's true identities and to establish a shared secret key. This key can then be used for privacy, data integrity, or both. The paper examines the security of public-key based authentication protocols, both with and without key exchange. It focuses on two-party mutual authentication, not multi-party or one-way protocols. It assumes that cryptographic mechanisms are not vulnerable and analyzes attacks on protocols.
Many identification and authentication schemes use asymmetric techniques. Identity-based schemes rely on a trusted authority. Günther proposed an identity-based protocol using Diffie-Hellman and ElGamal. Okamoto and Tanaka proposed an identity-based protocol based on exponential key exchange and RSA. These protocols provide indirect or direct authentication, though some fields may be redundant.
Interactive identification protocols, such as those by Fiat and Shamir, use zero-knowledge proofs. These differ from authenticated key exchanges, as they do not provide keys for future communications.
Cryptographic protocol design is error-prone, with many protocols containing security flaws. Published protocols often have redundancies or inefficiencies. This motivates the search for simple, efficient protocols with minimal communications, cryptographic operations, and message fields.
The paper emphasizes the importance of linking key exchange with authentication to prevent attacks where an adversary takes over a communication line after authentication. It defines a secure protocol and discusses the STS protocol, examining its features and comparing it with related protocols. The paper concludes with principles important in designing authentication protocols.