• DocumentCode
    763604
  • Title

    Cryptographic Authentication of Time-Invariant Quantities

  • Author

    Lennon, Richard E. ; Matyas, Stephen M. ; Meyer, Carl H.

  • Author_Institution
    System Communications Division, IBM Corporation, Kingston, NY, USA
  • Volume
    29
  • Issue
    6
  • fYear
    1981
  • fDate
    6/1/1981 12:00:00 AM
  • Firstpage
    773
  • Lastpage
    777
  • Abstract
    With any strong cryptographic algorithm, such as the data encryption standard (DES), it is possible to devise protocols for authentication. One technique, which allows arbitrary, time-invariant quantities (such as encrypted keys and passwords) to be authenticated, is based upon a secret cryptographic (master) key residing in a host processor. Each quantity to be authenticated has a corresponding precomputed test pattern. At any later time, the test pattern can be used together with the quantity to be authenticated to generate a nonsecret verification pattern. The verification pattern can in turn be used as the basis for accepting or rejecting the quantity to be authenticated.
  • Keywords
    Cryptography; Authentication; Banking; Computer errors; Cryptographic protocols; Cryptography; Data security; Operating systems; Protection; Test pattern generators; Testing;
  • fLanguage
    English
  • Journal_Title
    Communications, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    0090-6778
  • Type

    jour

  • DOI
    10.1109/TCOM.1981.1095067
  • Filename
    1095067