Extended authenticated key exchange is described. In one aspect, an
identity (ID.sub.A) of an initiator and an identity (ID.sub.B) of a
responder are determined. A first party (i.e., the initiator or the
responder) computes a session key based at least on ID.sub.A and
ID.sub.B. A second party (i.e., the initiator or the responder) that is
not the first party, uses at least ID.sub.A and ID.sub.B to compute a
corresponding session key. The initiator's session key and the
responder's corresponding session key, if equal, provide for secure
exchange of data between the initiator and the responder.