February 26, 2002
Practical Aspects of Modern Cryptography
5
Encrypted Key Exchange
n
Alice and Bob can then demonstrate to each
other their knowledge of
K
as an
authentication step.
n
Alice generates a random nonce
A
and sends
C
K
(A)
to Bob.
n
Bob generates a random nonce
B
and sends
C
K
(A,B)
to Alice.
n
Alice sends
C
K
(B)
to Bob.