• DocumentCode
    3070191
  • Title

    Random Values, Nonce and Challenges: Semantic Meaning versus Opaque and Strings of Data

  • Author

    Badra, Mohamad ; Guillet, Thomas ; Serhrouchni, Ahmed

  • Author_Institution
    LIMOS Lab., CNRS, France
  • fYear
    2009
  • fDate
    20-23 Sept. 2009
  • Firstpage
    1
  • Lastpage
    5
  • Abstract
    Current authentication and security protocols provide authentication services using either shared secret keys or certificates and public key infrastructures. They usually involve using random values and nonce to prohibit replay attacks and to generate fresh keys per each session. The Challenge-Response authentication mechanisms are the predominant access method for authentication and access control of today Internet applications. These mechanisms provide a proof of knowledge of the secret and then authenticate the communicating entity, which applies a cryptographic algorithm on the shared secret and the challenge sent by the other entity. Unfortunately, basic challenge-response mechanisms, such as HTTP Digest, do not provide mutual authentication and therefore suffer from several attacks, especially the man-in-the-middle and replay attacks. In this paper, we propose a semantic meaning for the challenge becoming used by these mechanisms. The proposed enhancement is completely backward-compatible; an entity aware of our extension connecting to another that does not wish to use or does not support it, will continue the basic authentication process. Moreover, our extension helps in reducing the identity usurpation attacks. A computation of the cryptographic loads and the data transfer demonstrates a negligible overall performance impact on the network and the entities.
  • Keywords
    Internet; cryptographic protocols; public key cryptography; authentication protocols; challenge-response authentication mechanisms; cryptographic algorithm; data transfer; nonce; public key infrastructures; random values; security protocols; shared secret keys; Access protocols; Authentication; Computer networks; File servers; Internet; Joining processes; Laboratories; Public key; Public key cryptography; Web server;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Vehicular Technology Conference Fall (VTC 2009-Fall), 2009 IEEE 70th
  • Conference_Location
    Anchorage, AK
  • ISSN
    1090-3038
  • Print_ISBN
    978-1-4244-2514-3
  • Electronic_ISBN
    1090-3038
  • Type

    conf

  • DOI
    10.1109/VETECF.2009.5378957
  • Filename
    5378957