<s>
In	O
cryptography	O
,	O
Simultaneous	B-Protocol
Authentication	I-Protocol
of	I-Protocol
Equals	I-Protocol
(	O
SAE	O
)	O
is	O
a	O
password-based	O
authentication	O
and	O
password-authenticated	B-Protocol
key	I-Protocol
agreement	I-Protocol
method	O
.	O
</s>
<s>
SAE	O
is	O
a	O
variant	O
of	O
the	O
Dragonfly	O
Key	O
Exchange	O
defined	O
in	O
,	O
based	O
on	O
Diffie	B-Protocol
–	I-Protocol
Hellman	I-Protocol
key	I-Protocol
exchange	I-Protocol
using	O
finite	O
cyclic	O
groups	O
which	O
can	O
be	O
a	O
primary	O
cyclic	O
group	O
or	O
an	O
elliptic	B-Protocol
curve	I-Protocol
.	O
</s>
<s>
The	O
problem	O
of	O
using	O
Diffie	B-Protocol
–	I-Protocol
Hellman	I-Protocol
key	I-Protocol
exchange	I-Protocol
is	O
that	O
it	O
does	O
not	O
have	O
an	O
authentication	O
mechanism	O
.	O
</s>
<s>
The	O
WPA3	O
standard	O
also	O
replaces	O
the	O
pre-shared	O
key	O
(	O
PSK	O
)	O
exchange	O
with	O
Simultaneous	B-Protocol
Authentication	I-Protocol
of	I-Protocol
Equals	I-Protocol
as	O
defined	O
in	O
IEEE	O
802.11-2016	O
resulting	O
in	O
a	O
more	O
secure	O
initial	O
key	O
exchange	O
in	O
personal	O
mode	O
.	O
</s>
