scispace - formally typeset
Journal ArticleDOI

Limitations of challenge-response entity authentication

Chris J. Mitchell
- 17 Aug 1989 - 
- Vol. 25, Iss: 17, pp 1195-1196
Reads0
Chats0
TLDR
This work considers two basic versions of the challenge-response authentication protocol, and exhibits both a method of attack and a simple modification preventing such attacks.
Abstract
We consider two basic versions of the challenge-response authentication protocol, and exhibit both a method of attack and a simple modification preventing such attacks. We go on to consider three variants of the basic protocols and show that one of them is completely insecure.

read more

Citations
More filters
Book ChapterDOI

Property Protection and User Authentication in IP Networks Through Challenge-Response Mechanisms: Present, Past, and Future Trends

TL;DR: This work introduces the basic concepts of authentication explaining their relationship with property protection, and the basic functionalities of Challenge-Response frameworks are presented.
Proceedings ArticleDOI

Smart card based remote authentication scheme with strengthened security via ECDH

TL;DR: In this paper, the authors have applied elliptic curve Diffie Hellman key exchange protocol (ECDH) into Liaw-Lin-Wu scheme to enhance its' security features and to improve its' efficiency.
Proceedings ArticleDOI

Authentication protocols for wireless ATM networks

TL;DR: Both secret-key and public-key cryptography are used in wireless ATM networks, which allows entities to provide evidence that they know a particular secret without revealing the secret.
Posted Content

A Survey of System Security in Contactless Electronic Passports

TL;DR: This paper surveys security mechanisms built in first-generation electronic passports and compares them with second-generation passports and analyzes and describes the cryptographic protocols used in Basic Access Control (BAC) and Extended access Control (EAC).
Proceedings ArticleDOI

An Enhanced Verifier-Free Remote User Password Authentication Scheme

TL;DR: This work proposes a new verifier-free remote user password authentication scheme that is more secure and practical than existing similar schemes.
References
Related Papers (5)