Sciweavers

TCS
2002

Authentication tests and the structure of bundles

13 years 4 months ago
Authentication tests and the structure of bundles
Suppose a principal in a cryptographic protocol creates and transmits a message containing a new value v, later receiving v back in a different cryptographic context. It can conclude that some principal possessing the relevant key has received and transformed the message in which v was emitted. In some circumstances, this principal must be a regular participant of the protocol, not the penetrator. An inference of this kind is an authentication test. We introduce two main kinds of authentication test. An outgoing test is one in which the new value v is transmitted in encrypted form, and only a regular participant can extract it from that form. An incoming test is one in which v is received back in encrypted form, and only a regular participant can put it in that form. We combine these two tests with a supplementary idea, the unsolicited test, and a related method for checking that keys remain secret. Together, these techniques determine what authentication properties are achieved by a ...
Joshua D. Guttman, F. Javier Thayer
Added 23 Dec 2010
Updated 23 Dec 2010
Type Journal
Year 2002
Where TCS
Authors Joshua D. Guttman, F. Javier Thayer
Comments (0)