Authenticated Key Exchange (EFT) is the exchange of session keys in a key exchange protocol that also authenticates the identities of the parties involved (for example. B, a password, a public key or a digital certificate). If you. B you connect to a password-protected WiFi network, an authenticated key protocol for the agreement is used, in most cases the agreement with the keys authenticated by the password (PAKE). If you connect to a public wi-fi network, an anonymous key agreement is put in place. Key equipment can be roughly divided into key traffic and key agreements. A key protocol or mechanism is a key method for installation, in which a common secret is derived from two or more parts as a function of information provided (ideally) by each of that information, so that no party can determine in advance the resulting value. In this process, the key is manufactured in a collaborative manner, so both parties have the key. The key exchange protocol is considered an important part of the cryptographic mechanism to protect end-to-end communications security. An example of the key exchange protocol is the exchange of Hellman files and keys [DIF 06, STA 10], which is known to be vulnerable to attack. To ensure a secure key exchange, [CHI 11] proposed a three-way exchange and agreement protocol (TW-KEAP).

This minutes provide both parties to the communication with the same key to meeting secure communication. The TW-KEAP concept stems from the four-part key exchange protocol, in which two customers are registered among the two different servers, and has expanded the benefits of the previous two protocols. A large number of cryptographic authentication schemes and protocols have been designed to provide authenticated key agreements to prevent man-in-the-middle and related attacks. These methods generally mathematically link the agreed key to other agreed data, such as the following: A widespread mechanism for repelling such attacks is the use of digitally signed keys that must be guaranteed integrity: If Bob`s key is signed by a trusted third party, guarantor of his identity, Alice may have considerable confidence in the fact that a signed key she receives No attempt is to intercept Eve. If Alice and Bob have an infrastructure with public keys, they can digitally sign a Diffie Hellman key or exchange a Diffie Hellman public key. These signed keys, sometimes signed by a certification body, are one of the primary mechanisms used for secure web data traffic (including DEE, SSL or Transport Layer Security protocols). Other specific examples are: MQV, YAK and the ISAKMP component of the IPsec protocol suite for securing internet protocol communications.