AKE Protocols Based on Diffie-Hellman
Let’s learn about the authentication protocol that is based on Diffie-Hellman.
We'll cover the following
Although the basic Diffie-Hellman protocol we described doesn’t provide authentication, there are many different ways in which it can be adapted to do so.
We now describe one way of building authentication. The station-to-station (STS) protocol makes an additional assumption that Alice and Bob have each established a long-term signature/verification key pair and have had their verification keys certified. A simplified STS protocol proceeds as follows (where all calculations are modulo ):
-
Alice randomly generates a positive integer and calculates . Alice sends to Bob along with the certificate for her verification key.
-
Bob verifies . If he is satisfied with the result, then Bob randomly generates a positive integer and calculates . Next, Bob signs a message consisting of Alice’s name, and . Bob then sends to Alice along with the certificate for his verification key and the signed message.
-
Alice verifies . If she is satisfied with the result, then she uses Bob’s verification key to verify the signed message. If she is satisfied with this too, she signs a message consisting of Bob’s name, , and , which she then sends back to Bob. Finally, Alice uses and her private key to compute .
-
Bob uses Alice’s verification key to verify the signed message he has just received. If he is satisfied with the result, then Bob uses and his private key to compute .
This protocol is shown in the illustration below:
Get hands-on with 1200+ tech skills courses.