The Wayback Machine - https://web.archive.org/web/20080313081157/http://citeseer.ist.psu.edu:80/diffie92authentication.html
See this document in CiteSeerX!

Authentication and Authenticated Key Exchanges (1992)  (Make Corrections)  (87 citations)
Whitfield Diffie, Paul C. van Oorschot, Michael J. Wiener
Designs, Codes and Cryptography



  Home/Search   Context   Related

 
View or download:
scs.carleton.ca/~paulv/p...stsfinal.ps
Cached:  PS.gz  PS  PDF   Image  Update  Help

From:  scs.carleton.ca/~paulv/papers/ (more)
(Enter author homepages)

Rate this article: (best)
  Comment on this article  
(Enter summary)

Abstract: We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques. A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protocols. The definition of a secure protocol is considered, and desirable characteristics of secure protocols are discussed. (Update)

Cited by:   More
An Encapsulated Authentication Logic - For Reasoning About   (Correct)
On the Performance, Feasibility, and Use of Forward-Secure.. - Cronin, Jamin, al. (2003)   (Correct)
An Efficient Authenticated Asymmetric Key Exchange Scheme - Chakraborty, Nandi (2000)   (Correct)

Active bibliography (related documents):   More   All
0.3:   A Method for Examining Cryptographic Protocols - Tjaden (1997)   (Correct)
0.3:   Computation of Discrete Logarithms in Prime Fields - LaMacchia, Odlyzko (1991)   (Correct)
0.3:   A Formal Semantics for Evaluating Cryptographic Protocols - Yasinsac (1996)   (Correct)

Similar documents based on text:   More   All
0.3:   On Diffie-Hellman Key Agreement with Short Exponents - van Oorschot, Wiener (1996)   (Correct)
0.3:   Parallel Collision Search with Cryptanalytic Applications - van Oorschot, Wiener (1996)   (Correct)
0.3:   A Known-Plaintext Attack on Two-Key Triple Encryption - van Oorschot, Wiener (1990)   (Correct)

Related documents from co-citation:   More   All
30:   New directions in cryptography - Diffie, Hellman - 1976
25:   Entity authentication and key distribution (context) - Bellare, Rogaway - 1993
18:   Using encryption for authentication in large networks of computers (context) - Needham, Schroeder - 1978

BibTeX entry:   (Update)

W. Diffie, P. C. van Oorschot, and M. J. Wiener. Authentication and authenticated key exchanges. Designs, Codes, and Cryptography, 1992. http://citeseer.ist.psu.edu/diffie92authentication.html   More

@article{ diffie92authentication,
    author = "Whitfield Diffie and Paul C. van Oorschot and Michael J. Wiener",
    title = "Authentication and Authenticated Key Exchanges",
    journal = "Designs, Codes and Cryptography",
    volume = "2",
    number = "2",
    pages = "107-125",
    year = "1992",
    url = "citeseer.ist.psu.edu/diffie92authentication.html" }
Citations (may not include all citations):
1529   A method for obtaining digital signatures and public-key cry.. - Rivest, Shamir et al. - 1978
635   New directions in cryptography - Diffie, Hellman - 1976
601   A public key cryptosystem and a signature scheme based on di.. (context) - ElGamal - 1985
411   How to prove yourself: practical solutions to identification.. - Fiat, Shamir - 1987
302   A logic of authentication - Burrows, Abadi et al. - 1990
201   Identity-based cryptosystems and signature schemes (context) - Shamir - 1985
176   Timestamps in key distribution protocols (context) - Denning, Sacco - 1981
168   An Improved Algorithm for Computing Logarithms over GF(p) an.. (context) - Pohlig, Hellman - 1978
136   The Kerberos network authentication service - Kohl, Neuman - 1991
132   How to time-stamp a digital document - Haber, Stornetta - 1991
122   A practical zero-knowledge protocol fitted to security micro.. (context) - Guillou, Quisquater - 1988
118   The Directory-Authentication Framework (context) - Book - 1988
112   Efficient identification and signatures for smart cards (context) - Schnorr - 1990
79   Limitations of the Kerberos authentication system - Bellovin, Merritt - 1990
56   Systematic design of two-party authentication protocols - Bird, Gopal et al.
47   Discrete logarithms in finite fields and their cryptographic.. - Odlyzko - 1985
47   Protocol failures in cryptosystems (context) - Moore - 1988
40   Computation of Discrete Logarithms in Prime Fields - LaMacchia, Odlyzko - 1991
21   How to expose an eavesdropper (context) - Rivest, Shamir - 1984
12   Limitations of challenge-response entity authentication (context) - Mitchell - 1989
11   Key distribution system based on identification information (context) - Okamoto, Tanaka - 1989
8   How to keep authenticity alive in a computer network (context) - Bauspie, Knobloch - 1990
7   Secure implementation of identification system (context) - Bengio, Brassard et al. - 1991
4   Applying a formal analysis technique to the CCITT X.509 stro.. (context) - Gaarder, Snekkenes - 1991
1   Security defects in CCITT Recommendation X.509 - The Directo.. (context) - I'Anson, Mitchell - 1990
1   An identity-based key-exchange protocol (context) - Gnther - 1990
1   Encryption and ISDN - A Natural Fit (context) - O'Higgins, Diffie et al. - 1987
1   BerlinNew York Springer Verlag (context) - Modern, Notes et al. - 1988



The graph only includes citing articles where the year of publication is known.


Documents on the same site (http://www.scs.carleton.ca/~paulv/papers/):   More
Addressing Online Dictionary Attacks with Login.. - Stubblebine, van.. (2004)   (Correct)
Security Analysis of the Message Authenticator Algorithm.. - Preneel, Rijmen, van.. (1997)   (Correct)
A Generic Attack on Checksumming-Based Software Tamper.. - Wurster, van Oorschot, .. (2005)   (Correct)

Online articles have much greater impact   More about CiteSeer.IST   Add search form to your site   Submit documents   Feedback  

CiteSeer.IST - Copyright Penn State and NEC