Title :
Limitations of challenge-response entity authentication
Author_Institution :
Hewlett-Packard Labs., Bristol, UK
Abstract :
Considers two basic versions of the challenge-response authentication protocol, and exhibits both a method of attack and a simple modification preventing such attacks. The author goes on to consider three variants of the basic protocols and show that one of them is completely insecure.
Keywords :
data communication systems; protocols; security of data; authentication protocol; challenge-response entity authentication; variants;
Journal_Title :
Electronics Letters
DOI :
10.1049/el:19890801