February 26, 2002
Practical Aspects of Modern Cryptography
5
Encrypted Key Exchange
nAlice and Bob can then demonstrate to each other their knowledge of K as an authentication step.
nAlice generates a random nonce A and sends CK(A) to Bob.
nBob generates a random nonce B and sends CK(A,B) to Alice.
nAlice sends CK(B) to Bob.