ENTITY AUTHENTICATION BASED ON CHALLENGE-RESPONSE TECHNIQUES

被引:0
|
作者
Oros, Horea [1 ]
Boian, Florian M. [1 ]
机构
[1] Univ Oradea, Dept Math & Comp Sci, St Univ 1, Oradea 410087, Romania
关键词
authentication; protocol; challenge-response; nonce;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Entity authentication is a process by which one party obtains evidence regarding the identity of a second party involved in a protocol, and that the second party effectively participated to the process, being active when the evidence is obtained or immediately prior to the time the evidence is acquired. This paper presents general techniques used in entity authentication protocols, techniques based on challenge-response mechanism. These techniques use time-variant parameters in the form of random numbers, sequence numbers or times-tamps. We investigate challenge-response techniques based on symmetric and asymmetric cryptography.
引用
收藏
页码:373 / +
页数:3
相关论文
共 50 条
  • [1] LIMITATIONS OF CHALLENGE-RESPONSE ENTITY AUTHENTICATION
    MITCHELL, C
    [J]. ELECTRONICS LETTERS, 1989, 25 (17) : 1195 - 1196
  • [2] Challenge-response based ACK message authentication
    Park, Min-Ho
    [J]. ELECTRONICS LETTERS, 2012, 48 (16) : 1021 - 1022
  • [3] Challenge-Response Authentication Scheme With Chaotic Lasers
    Annovazzi-Lodi, Valerio
    Lombardi, Lorenzo
    Aromataris, Giuseppe
    [J]. IEEE JOURNAL OF QUANTUM ELECTRONICS, 2022, 58 (01)
  • [4] Challenge-response based RFID authentication protocol for distributed database environment
    Rhee, K
    Kwak, J
    Kim, S
    Won, D
    [J]. SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS, 2005, 3450 : 70 - 84
  • [5] Analysis of Challenge-Response Authentication in a Networked Control System
    Rzasa, Wojciech
    Rzonca, Dariusz
    Stec, Andrzej
    Trybus, Bartosz
    [J]. COMPUTER NETWORKS, 2012, 291 : 271 - 279
  • [6] 2-clickAuth - Optical Challenge-Response Authentication
    Vapen, Anna
    Byers, David
    Shahmehri, Nahid
    [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 79 - 86
  • [7] Analysis of Challenge-Response Authentication with Reconfigurable Intelligent Surfaces
    Tomasin, Stefano
    Elwakeel, Tarek N. M. M.
    Guglielmi, Anna Valeria
    Maes, Robin
    Noels, Nele
    Moeneclaey, Marc
    [J]. IEEE Transactions on Information Forensics and Security, 2024, 19 : 9494 - 9507
  • [8] Asynchronous Challenge-Response Authentication Solution based on Smart Card in Cloud Environment
    Zhao, Guifen
    Li, Ying
    Du, Liping
    Zhao, Xin
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING ICISCE 2015, 2015, : 156 - 159
  • [9] Off-Path Hacking: The Illusion of Challenge-Response Authentication
    Gilad, Yossi
    Herzberg, Amir
    Shulman, Haya
    [J]. IEEE SECURITY & PRIVACY, 2014, 12 (05) : 68 - 77
  • [10] VELODY: Nonlinear Vibration Challenge-Response for Resilient User Authentication
    Li, Jingjie
    Fawaz, Kassem
    Kim, Younghyun
    [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1201 - 1213