Key authentication is used to solve the problem of authenticating the keys of the person (say 'person B') to whom some other person ('person A') is talking to or trying to talk to. In other words, it is the process of assuring that the key of 'person A' held by 'person B' does in fact belong to 'person A' and vice versa. Key authentication is used to solve the problem of authenticating the keys of the person (say 'person B') to whom some other person ('person A') is talking to or trying to talk to. In other words, it is the process of assuring that the key of 'person A' held by 'person B' does in fact belong to 'person A' and vice versa.