1981
DOI: 10.1109/tcom.1981.1095067
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Authentication of Time-Invariant Quantities

Abstract: With any strong cryptographic algorithm, such as the data encryption standard (DES), it is possible to devise protocols for . "authentication. One technique, which allows arbitrary, time-invar-.~I'iant quantities (such as encrypted keys and passwords) to be auj ; ..~ thenticated, is based upon a secret-cryptographic (master) key residing in a host processor. Each quantity to be authenticated has a corresponding precomputed test pattern. At any later time, the test pattern can be used together with the quantity… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
18
0

Year Published

1987
1987
2015
2015

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 79 publications
(18 citation statements)
references
References 9 publications
0
18
0
Order By: Relevance
“…Finally, we note that several other research efforts on password security have focused on detecting the unauthorized modification of system information related to password authentication (e.g., the attacker adds a new account with a password it knows, or changes the password of an existing account) [12,16,19]. Here we do not focus on this threat model, although our hardened passwords can be directly combined with these techniques to also provide security against this type of attacker.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, we note that several other research efforts on password security have focused on detecting the unauthorized modification of system information related to password authentication (e.g., the attacker adds a new account with a password it knows, or changes the password of an existing account) [12,16,19]. Here we do not focus on this threat model, although our hardened passwords can be directly combined with these techniques to also provide security against this type of attacker.…”
Section: Related Workmentioning
confidence: 99%
“…In 1981, Lamport [1] proposed a remote password authentication scheme that could authenticate remote users over an insecure channel. Since then, many similar schemes [2,3] have been proposed to improve security, efficiency or cost.…”
Section: Introductionmentioning
confidence: 99%
“…In the last two decades, to protect the remote server from these malicious attacks, many elegant authentication schemes have been proposed [1][2][3][4][5]. However, some schemes [1,2,4,5] have to maintain a password verification table in the remote server for checking the legitimacy of the login users.…”
Section: Introductionmentioning
confidence: 99%