A method for establishing a link key between correspondents in a public
key cryptographic scheme, one of the correspondents being an
authenticating device and the other being an authenticated device. The
method also provides a means for mutual authentication of the devices.
The authenticating device may be a personalized device, such as a mobile
phone, and the authenticated device may be a headset. The method for
establishing the link key includes the step of introducing the first
correspondent and the second correspondent within a predetermined
distance, establishing a key agreement and implementing
challenge-response routine for authentication. Advantageously, man-in-the
middle attacks are minimized.