DocumentCode
763604
Title
Cryptographic Authentication of Time-Invariant Quantities
Author
Lennon, Richard E. ; Matyas, Stephen M. ; Meyer, Carl H.
Author_Institution
System Communications Division, IBM Corporation, Kingston, NY, USA
Volume
29
Issue
6
fYear
1981
fDate
6/1/1981 12:00:00 AM
Firstpage
773
Lastpage
777
Abstract
With any strong cryptographic algorithm, such as the data encryption standard (DES), it is possible to devise protocols for authentication. One technique, which allows arbitrary, time-invariant quantities (such as encrypted keys and passwords) to be authenticated, is based upon a secret cryptographic (master) key residing in a host processor. Each quantity to be authenticated has a corresponding precomputed test pattern. At any later time, the test pattern can be used together with the quantity to be authenticated to generate a nonsecret verification pattern. The verification pattern can in turn be used as the basis for accepting or rejecting the quantity to be authenticated.
Keywords
Cryptography; Authentication; Banking; Computer errors; Cryptographic protocols; Cryptography; Data security; Operating systems; Protection; Test pattern generators; Testing;
fLanguage
English
Journal_Title
Communications, IEEE Transactions on
Publisher
ieee
ISSN
0090-6778
Type
jour
DOI
10.1109/TCOM.1981.1095067
Filename
1095067
Link To Document