Symmetric key authentication using verification in public?

نویسنده

  • Jaap-Henk Hoepman
چکیده

Several protocols for authentication using memory-constrained smart cards or tokens based on symmetric key cryptography are described. Key property of these protocols is that verification on the server can be performed in public based on (more or less) publicly known information. The protocols use a symmetric cipher in an asymmetric fashion: the verifier uses a verification key that cannot be used to generate a valid authentication response. Verification in public means that the verification server does not have to be equipped with some tamper resistant device storing the verification keys. Nor is it necessary to secure the server to similar strength in a different fashion. The protocols are especially suitable for environments in which smart cards or active tokens are used as authentication devices. In these environments symmetric key protocols are extensively used, and will be used for some time to come, to reduce both system cost and transaction time.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Remote User Authentication Using Public Information

A method for remote user authentication is proposed that requires only public information to be stored at the verifying host. Like the S/KEY scheme, the new technique uses only symmetric cryptography and is resistant to eavesdropping, but, unlike S/KEY, it is resistant to host impersonation attacks. The avoidance of asymmetric cryptographic techniques makes the scheme appropriate for low cost u...

متن کامل

A Novel Authentication Protocol for Wireless Access Security

This paper proposes a novel authentication protocol for wireless access security. Current symmetric key based authentication schemes are vulnerable to a variety of attacks such as the denialof-service attacks and the domino effect attacks, while public key based authentication schemes are costly. This paper designed a novel elliptic curve based authentication scheme that can avoid the certifica...

متن کامل

Fast authentication in wireless sensor networks

Broadcast authentication is a fundamental security service in wireless sensor networks (WSNs). Although symmetric-key-based μTESLA-like schemes were employed due to their energy efficiency, they all suffer from DoS attacks resulting from the nature of delayed message authentication. Recently, several public-key-based schemes were proposed to achieve immediate broadcast authentication that may s...

متن کامل

Biometric System Using Cryptography: A Survey

In this paper, the biometric recognition for verification identification process and various cryptographic techniques for authentication purpose are discussed along with detailed review of literature. the main objective of this approach is to combine both cryptographic and biometric recognition to a system to provide high degree of security with protection against various attackers. Keywords— B...

متن کامل

TESLA Certificates: An Authentication Tool for Networks of Compute-Constrained Devices

In the near future wireless networks will consist of lowpowered, compute-constrained devices. These devices will have limited ability to perform the expensive computational operations associated with public key cryptography. This will limit the usefulness of conventional authentication mechanisms based on public key certificates in these domains. In this paper we introduce an alternative to con...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001