Title :
Cryptographic Authentication of Time-Invariant Quantities
Author :
Lennon, Richard E. ; Matyas, Stephen M. ; Meyer, Carl H.
Author_Institution :
System Communications Division, IBM Corporation, Kingston, NY, USA
fDate :
6/1/1981 12:00:00 AM
Abstract :
With any strong cryptographic algorithm, such as the data encryption standard (DES), it is possible to devise protocols for authentication. One technique, which allows arbitrary, time-invariant quantities (such as encrypted keys and passwords) to be authenticated, is based upon a secret cryptographic (master) key residing in a host processor. Each quantity to be authenticated has a corresponding precomputed test pattern. At any later time, the test pattern can be used together with the quantity to be authenticated to generate a nonsecret verification pattern. The verification pattern can in turn be used as the basis for accepting or rejecting the quantity to be authenticated.
Keywords :
Cryptography; Authentication; Banking; Computer errors; Cryptographic protocols; Cryptography; Data security; Operating systems; Protection; Test pattern generators; Testing;
Journal_Title :
Communications, IEEE Transactions on
DOI :
10.1109/TCOM.1981.1095067