A protocol for use as a phase 1 authentication (and key agreement) IKE protocol, similar to IKE phase 1 authentication with public key encryption, but using the IMS AKA trust infrastructure instead of the PKI trust infrastructure. The invention thus allows an initiator (11) having a secret long-term key stored on a smart cart (11a), to authenticate a responder (12), the responder (12) having in some cases a trusted interface with a Home Subscriber Server (14) that has a copy (14a) of the initiator's long-term key (and in other cases having itself access to the initiator's long-term key). The protocol includes a Diffie-Hellman exchange, and by authenticating the initiator (11) and responder (12), the protocol authenticates the exchange.

 
Web www.patentalert.com

> Cryptographic key, encryption device, encryption/decryption device, cryptographic key management device, and decryption device

~ 00378