Limitations of challenge-response entity authentication

Chris J. Mitchell

(1989)

Chris J. Mitchell (1989) Limitations of challenge-response entity authentication. Electronics Letters, 25 (17).

Our Full Text Deposits

Full text access: Open

Full Text - 21.05 KB

Full Text - 98.81 KB

Links to Copies of this Item Held Elsewhere


Abstract

We consider two basic versions of the challenge-response authentication protocol, and exhibit both a method of attack and a simple modification preventing such attacks. We go on to consider three variants of the basic protocols and show that one of them is completely insecure.

Information about this Version

This is a Published version
This version's date is: 08/1989
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/c2121a5c-5521-6c26-1ef4-312ddf0ad688/1/

Item TypeJournal Article
TitleLimitations of challenge-response entity authentication
AuthorsMitchell, Chris
Uncontrolled Keywordschallenge-response protocol, attack, modification
DepartmentsFaculty of Science\Mathematics

Identifiers

doi10.1049/el:19890801

Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 21-May-2010

Notes

©20xx IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.


Details