Table of Contents

 1     Scope          
 2     References
 3     Terms and definitions          
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Overview  
 7     Security threats      
        7.1     Server impersonation
        7.2     Other types of attacks              
 8     General model        
        8.1     Entities           
        8.2     Operational procedure of HAKE            
        8.3     Requirements for HAKE           
 9     Protocols   
        9.1     Two types of HAKE     
        9.2     HAKE protocols using shared secrets and identity-based cryptosystem
        9.3     HAKE protocols using shared secrets and public key infrastructure (PKI)             
10     Extensions of HAKE              
Appendix I – Comparison of HAKE protocols    
Bibliography