BYU logo Computer Science
CS 465 Introduction to Security and Privacy

Entity Authentication

Key Concepts

Entity Authentication

  • Alice and Bob share a key in advance

  • Later, how can each side prove that they know the key? For example, if they want to prove they really are talking to each other

  • A simple method is to use a challenge-response protocol

    • Alice sends a challenge that Bob can only answer if he knows the secret
    • Such a protocol is called a proof of knowledge protocol
  • Unilateral: Alice wants Bob to prove he has the secret

entity authentication
  • Mutual: Alice and Bob prove to each other they have the secret
mutual-entity authentication

Key Establishment

  • How do Alice and Bob establish the secret key in the first place?
  • Usually want to establish a session key, meaning a new key for each time you talk
    • key transport: one key chooses the key and needs to get it to the other party
    • key establishment: derive a shared key using information from both parties
  • Generally want to authenticate the other party AND establish a session key all at once
  • Key management is hard
    • establishing shared keys
    • securing them in transit and storage