This article provides insufficient context for those unfamiliar with the subject. Please help improve the article by providing more context for the reader. (April 2021) (Learn how and when to remove this message) |
Authenticated Key Exchange (AKE), Authenticated Key Agreement (AKA) or Authentication and Key Establishment (AKE) is the exchange or creation of a session key in a key exchange protocol which also authenticates the identities of parties involved in key exchange. AKE typically occurs at the beginning of a communication session. Features of AKE protocols include determination of which keys already exist and can be used, how new keys will be generated, and how many users the protocol is applicable to.
AKE protocols make use of long term keys that exist prior to the protocol, and session keys, which are typically symmetric keys established during the execution of the protocol. AKE protocols can be divided into four categories, based on the different types of long term keys used:
- Pre-shared keys
- Public–private key pairs
- Identity-based keys
- Passwords
The use of Transport Layer Security (TLS) to secure HTTP connections is perhaps the most widely deployed AKE protocol.
References
- Diffie, W.; van Oorschot, P.; Wiener, M. (June 1992). "Authentication and authenticated key exchanges". Designs, Codes and Cryptography. 2 (2): 107–125. CiteSeerX 10.1.1.59.6682. doi:10.1007/BF00124891. S2CID 7356608.
- ^ Boyd, C., Mathuria, A., & Stebila, D. (2020). Protocols for authentication and Key Establishment. Springer Berlin Heidelberg.
- Eric Rescorla (August 2018). "The Transport Layer Security (TLS) Protocol Version 1.3". Mozilla. The Internet Engineering Task Force. Archived from the original on 14 May 2021.
This computer security article is a stub. You can help Misplaced Pages by expanding it. |