DocumentCode :
763604
Title :
Cryptographic Authentication of Time-Invariant Quantities
Author :
Lennon, Richard E. ; Matyas, Stephen M. ; Meyer, Carl H.
Author_Institution :
System Communications Division, IBM Corporation, Kingston, NY, USA
Volume :
29
Issue :
6
fYear :
1981
fDate :
6/1/1981 12:00:00 AM
Firstpage :
773
Lastpage :
777
Abstract :
With any strong cryptographic algorithm, such as the data encryption standard (DES), it is possible to devise protocols for authentication. One technique, which allows arbitrary, time-invariant quantities (such as encrypted keys and passwords) to be authenticated, is based upon a secret cryptographic (master) key residing in a host processor. Each quantity to be authenticated has a corresponding precomputed test pattern. At any later time, the test pattern can be used together with the quantity to be authenticated to generate a nonsecret verification pattern. The verification pattern can in turn be used as the basis for accepting or rejecting the quantity to be authenticated.
Keywords :
Cryptography; Authentication; Banking; Computer errors; Cryptographic protocols; Cryptography; Data security; Operating systems; Protection; Test pattern generators; Testing;
fLanguage :
English
Journal_Title :
Communications, IEEE Transactions on
Publisher :
ieee
ISSN :
0090-6778
Type :
jour
DOI :
10.1109/TCOM.1981.1095067
Filename :
1095067
Link To Document :
بازگشت