How can Alice ping and authenticate Bob without any of them sharing their public keyes beforehand

Both hosts have just their public and private key pair (but they do not have the other party’s public key).
Bob should be authenticated
Assume that the two hosts share clocks that are synced, i.e timestamps can be used.

I have not found … Continue reading How can Alice ping and authenticate Bob without any of them sharing their public keyes beforehand