Secret Key Authentication with Software-Only Verification

نویسنده

  • Jaap-Henk Hoepman
چکیده

Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secure storage of any secret information. The protocols use a symmetric cipher in an asymmetric fashion: the verifier uses a verification key which is derived from a symmetric master key. Software only verification means that the verifier does not have to be equipped with some tamper resistant device storing the verification keys. The protocols are especially suitable for the smart card environment where symmetric key protocols are extensively used, and will be used for some time to come, to reduce both system cost and transaction time.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Message Authentication Scheme for Vehicular Ad-Hoc Wireless Networks without RSU

Studies were conducted on vehicular ad-hoc network (VANET) in recent years. VANET is a network that combines on-board wireless equipment (On-Board Unit, OBU) and roadside fixed wireless equipment (Road Side Unit, RSU) through wireless communication technology. When vehicles broadcast messages, the traditional systems usually use RSU to do message authentication that we can ensure messages are i...

متن کامل

Remarks on Zhang-Kim's Key Authentication Scheme

Key authentication is very important in secret communications and data security. Lee et al. proposed a new public key authentication scheme for cryptosystems based on discrete logarithms in 2003. Recently, Zhang et al. pointed out that Lee et al.’s scheme was not secure and proposed an improvement on it. However, in this paper, we will demonstrate that a dishonest user can forge the public key ...

متن کامل

Secret Handshakes based on Shortened Versions of DSS

Balfanz et al. in 2003 introduced secret handshakes as mechanisms designed to prove group membership and share a secret key between two fellow group members. A secret handshake protocol allows two users to mutually verify another’s authenticity without revealing their own identity. In a secret handshake Verification if the verification succeeds the users may compute a common shared key for furt...

متن کامل

Forward Secure Identity Based Ring Signature Scheme for Images

Due to the advance of new technology data sharing has never been easier in this world. An accurate analysis on the shared data provides a group of benefits to both the society and individuals. Data sharing between two members or group of members must take into account several issues. They are efficiency, data integrity and privacy of data owner. To overcome this issue Ring signature concept is ...

متن کامل

Cryptography and security: Quick reference

Part II Themes Communication in the presence of an adversary. Encryption; efficiency of encryption: important due to pervasive communication; Batch verification. Authentication. Key distribution. Access control. Crypto-analysis: Break hardness assumptions used in cryptography. Make better proofs of security. Proving the security of protocols. Code obfuscation: Hide your intent. 0 knowledge proo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000