Sciweavers

FC
2000
Springer

Secret Key Authentication with Software-Only Verification

14 years 3 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secure storage of any secret information. The protocols use a symmetric cipher in an asymmetric fashion: the verifier uses a verification key which is derived from a symmetric master key. Software only verification means that the verifier does not have to be equipped with some tamper resistant device storing the verification keys. The protocols are especially suitable for the smart card environment where symmetric key protocols are extensively used, and will be used for some time to come, to reduce both system cost and transaction time.
Jaap-Henk Hoepman
Added 24 Aug 2010
Updated 24 Aug 2010
Type Conference
Year 2000
Where FC
Authors Jaap-Henk Hoepman
Comments (0)