An AKE Protocol Based on Key Distribution
Let’s learn about the AKE protocol based on key distribution and the use of symmetric cryptography.
We'll cover the following
The STS protocol is an AKE protocol based on key agreement and public-key cryptography. We will now look at an AKE protocol based on key distribution and the use of symmetric cryptography. This protocol is a simplified version of one from ISO 9798-2. This protocol involves using a trusted third party (denoted by TTP).
Protocol description
The idea behind this AKE protocol is that Alice and Bob both trust the TTP. When Alice and Bob wish to establish a shared key , they will ask the TTP to generate one for them, which will then be securely distributed to them. The protocol involves the following assumptions:
-
Alice has already established a long-term shared symmetric key with the TTP.
-
Bob has already established a long-term shared symmetric key with the TTP.
-
Alice and Bob are both capable of randomly generating nonces.
Get hands-on with 1200+ tech skills courses.