0 references
Unilateral authentication on low-cost devices
2015Vol. 65, pp. 88–92
Abstract
This paper deals with unilateral authentication on low-cost devices. Security properties for secure authentication protocol are specified herein. Based on these security properties we proposed four simple unilateral authentication protocols. Protocol for unilateral authentication using symmetric cipher, protocol for unilateral authentication using a HMAC function, protocol for unilateral authentication using a hash function and protocol for unilateral authentication using permutation. Their security against common attacks is discussed.
Related Papers
- → Designing an Authentication Protocol via Authentication Test(2007)1 cited
- Survey of Authentication Protocol(2013)
- → Improved Cryptographic Protection of Information using Robust Authentication Algorithms(2013)
- Design and Analysis of Authentication Protocol in Military Network(2001)
- → Improved Cryptographic Protection of Information using Robust Authentication Algorithms(2013)