Secret Key Authentication with Software-Only Verification
نویسنده
چکیده
Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secure storage of any secret information. The protocols use a symmetric cipher in an asymmetric fashion: the verifier uses a verification key which is derived from a symmetric master key. Software only verification means that the verifier does not have to be equipped with some tamper resistant device storing the verification keys. The protocols are especially suitable for the smart card environment where symmetric key protocols are extensively used, and will be used for some time to come, to reduce both system cost and transaction time.
منابع مشابه
Message Authentication Scheme for Vehicular Ad-Hoc Wireless Networks without RSU
Studies were conducted on vehicular ad-hoc network (VANET) in recent years. VANET is a network that combines on-board wireless equipment (On-Board Unit, OBU) and roadside fixed wireless equipment (Road Side Unit, RSU) through wireless communication technology. When vehicles broadcast messages, the traditional systems usually use RSU to do message authentication that we can ensure messages are i...
متن کاملRemarks on Zhang-Kim's Key Authentication Scheme
Key authentication is very important in secret communications and data security. Lee et al. proposed a new public key authentication scheme for cryptosystems based on discrete logarithms in 2003. Recently, Zhang et al. pointed out that Lee et al.’s scheme was not secure and proposed an improvement on it. However, in this paper, we will demonstrate that a dishonest user can forge the public key ...
متن کاملSecret Handshakes based on Shortened Versions of DSS
Balfanz et al. in 2003 introduced secret handshakes as mechanisms designed to prove group membership and share a secret key between two fellow group members. A secret handshake protocol allows two users to mutually verify another’s authenticity without revealing their own identity. In a secret handshake Verification if the verification succeeds the users may compute a common shared key for furt...
متن کاملForward Secure Identity Based Ring Signature Scheme for Images
Due to the advance of new technology data sharing has never been easier in this world. An accurate analysis on the shared data provides a group of benefits to both the society and individuals. Data sharing between two members or group of members must take into account several issues. They are efficiency, data integrity and privacy of data owner. To overcome this issue Ring signature concept is ...
متن کاملCryptography and security: Quick reference
Part II Themes Communication in the presence of an adversary. Encryption; efficiency of encryption: important due to pervasive communication; Batch verification. Authentication. Key distribution. Access control. Crypto-analysis: Break hardness assumptions used in cryptography. Make better proofs of security. Proving the security of protocols. Code obfuscation: Hide your intent. 0 knowledge proo...
متن کامل