SlideShare ist ein Scribd-Unternehmen logo
1 von 24
A Survey of RFID Authentication Protocols Compiled by : Dr. Vidyasagar Potdar Yawer Yousuf Khan
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RFID Architecture ,[object Object],Semi Passive Active Passive
RFID Architecture (cont.) Operational Process
RFID Architecture (cont.) RFID Architecture
Applications of RFID ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Issues ,[object Object],[object Object],[object Object],[object Object],[object Object]
Types of attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Classification of Authentication Protocols: what, why and how? ,[object Object],[object Object],[object Object]
Classification of Authentication Protocols: what, why and how? ,[object Object],[object Object],[object Object],[object Object]
Classification of Authentication Protocols: what, why and how? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Preliminary Concepts ,[object Object],[object Object],[object Object],[object Object]
Preliminary Concepts ,[object Object],[object Object],[object Object],[object Object]
Process of Classification ,[object Object],[object Object],[object Object]
Process of Classification ,[object Object],[object Object],[object Object],[object Object],[object Object]
Prototypes of Authentication A   B :  APubKey {  B ,  r B   } A   B :  r B DA F, Ack A   B :  APubKey {  B ,  r B   } DA F, NoAck A   B :  APubKey {  B  } DA  Destination Authentication (DA) A   B :  r B   A  B :  APriKey  {  B ,  r B   } OA F A   B :  TS A   ,  APriKey {  B ,  TS A   } OA S A   B :  APriKey {  B  } OA   Origin Authentication (OA) A   B :  r B   A: Ap riKey  {  B ,  r B   } IA F A :  ApriKey {  B  } IA Ø Implicit Authentication (IA) Example Authentication Type
Prototypes of Mutual Authentication 1. A   B:  r A 2. A   B:  r B A:  APriKey {  B ,  r B   } B:  BPriKey {  A ,  r A   } IA F -IA F A:  APriKey {  B  } B:  BPriKey {  A  }     1. A   B:  BPubKey {  A  } DA   1. A  B:  r A B: IA F-  Example Prototype
Prototypes of Mutual Authentication 1. A   B:  r A 2. A  B:  APubKey { B ,  r B   ,  BPriKey {  A ,  r A   } } or, 1. A   B:  r A 2. A   B:  BPriKey {  A ,  r A   ,  APubKey { B ,  r B   } } OA F -   DA F , NoAck 1. A   B:  r A 2. A   B:  BPriKey {  A ,  r A   },  r B 3. A   B:  APrikey {  B ,  r B   } OA F -OA F 1. A   B:  r A   ,  TS A   ,  APriKey {  B ,  TS A   } B:  BPriKey {  r A   } IA F -OA S Example Prototype
Prototypes of Mutual Authentication 1. A   B:  BPubKey {  A ,  r A   } 2. A  B:  APubKey {  B ,  r B  },  r A 3. A  B:  r B DA F,Ack -DA F,Ack 1. A  B:  BPubKey {  A ,  r A   } 2. A   B:  APubKey {  B ,  r B   } DA F,NoAck -DA F,NoAck 1. A   B:  BPubKey {  A ,  r A   } 2. A   B:  r A   ,  r B 3. A  B:  APriKey {  B ,  r B   } DA F,Ack -OA F 1. A   B:  BPubKey { A ,  r A  ,  TS A  ,  APriKey {  B ,  TS A   } } or, 1. A   B:  TSA  ,  APriKey {  B ,  TS A   ,  BPubKey { A ,  r A   } } DA F,NoAck -OA S Example Prototype
Minimalist Approach ,[object Object],[object Object],[object Object]
Minimalist Approach ,[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You

Weitere ähnliche Inhalte

Ähnlich wie Survey paper

IMPERSONATION ATTACK ON EKE PROTOCOL
IMPERSONATION ATTACK ON EKE PROTOCOLIMPERSONATION ATTACK ON EKE PROTOCOL
IMPERSONATION ATTACK ON EKE PROTOCOLIJNSA Journal
 
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...IJNSA Journal
 
Wpmc2004 phy protection
Wpmc2004 phy protectionWpmc2004 phy protection
Wpmc2004 phy protectionArpan Pal
 
E Snet Authentication Fabric Pilot
E Snet Authentication Fabric PilotE Snet Authentication Fabric Pilot
E Snet Authentication Fabric PilotFNian
 
RFID Talk
RFID TalkRFID Talk
RFID Talkmasud80
 
Computational science guided soft
Computational science guided softComputational science guided soft
Computational science guided softijcsa
 
Improved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network AuthenticationImproved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network AuthenticationGovind Maheswaran
 
Semantics and optimisation of the SPARQL1.1 federation extension
Semantics and optimisation of the SPARQL1.1 federation extensionSemantics and optimisation of the SPARQL1.1 federation extension
Semantics and optimisation of the SPARQL1.1 federation extensionOscar Corcho
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...IRJET Journal
 
Identity-Based Blind Signature Scheme with Message Recovery
Identity-Based Blind Signature Scheme with Message Recovery Identity-Based Blind Signature Scheme with Message Recovery
Identity-Based Blind Signature Scheme with Message Recovery IJECEIAES
 
Hamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar DecoderHamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar DecoderRSIS International
 
IP Security in Network Security NS6
IP Security in Network Security NS6IP Security in Network Security NS6
IP Security in Network Security NS6koolkampus
 

Ähnlich wie Survey paper (20)

IMPERSONATION ATTACK ON EKE PROTOCOL
IMPERSONATION ATTACK ON EKE PROTOCOLIMPERSONATION ATTACK ON EKE PROTOCOL
IMPERSONATION ATTACK ON EKE PROTOCOL
 
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
 
Arp Cache Poisoning
Arp Cache PoisoningArp Cache Poisoning
Arp Cache Poisoning
 
Ip Sec
Ip SecIp Sec
Ip Sec
 
Wpmc2004 phy protection
Wpmc2004 phy protectionWpmc2004 phy protection
Wpmc2004 phy protection
 
ma52009id420
ma52009id420ma52009id420
ma52009id420
 
An effective RC4 Stream Cipher
An effective RC4 Stream CipherAn effective RC4 Stream Cipher
An effective RC4 Stream Cipher
 
Ip Sec
Ip SecIp Sec
Ip Sec
 
Ip Sec Rev1
Ip Sec Rev1Ip Sec Rev1
Ip Sec Rev1
 
E Snet Authentication Fabric Pilot
E Snet Authentication Fabric PilotE Snet Authentication Fabric Pilot
E Snet Authentication Fabric Pilot
 
RFID Talk
RFID TalkRFID Talk
RFID Talk
 
12 tcp-dns
12 tcp-dns12 tcp-dns
12 tcp-dns
 
Computational science guided soft
Computational science guided softComputational science guided soft
Computational science guided soft
 
Improved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network AuthenticationImproved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network Authentication
 
Semantics and optimisation of the SPARQL1.1 federation extension
Semantics and optimisation of the SPARQL1.1 federation extensionSemantics and optimisation of the SPARQL1.1 federation extension
Semantics and optimisation of the SPARQL1.1 federation extension
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
 
SVQdotNET: Building APIs with OpenApi
SVQdotNET: Building APIs with OpenApiSVQdotNET: Building APIs with OpenApi
SVQdotNET: Building APIs with OpenApi
 
Identity-Based Blind Signature Scheme with Message Recovery
Identity-Based Blind Signature Scheme with Message Recovery Identity-Based Blind Signature Scheme with Message Recovery
Identity-Based Blind Signature Scheme with Message Recovery
 
Hamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar DecoderHamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar Decoder
 
IP Security in Network Security NS6
IP Security in Network Security NS6IP Security in Network Security NS6
IP Security in Network Security NS6
 

Kürzlich hochgeladen

Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 

Kürzlich hochgeladen (20)

Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 

Survey paper

  • 1. A Survey of RFID Authentication Protocols Compiled by : Dr. Vidyasagar Potdar Yawer Yousuf Khan
  • 2.
  • 3.
  • 4. RFID Architecture (cont.) Operational Process
  • 5. RFID Architecture (cont.) RFID Architecture
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Prototypes of Authentication A  B : APubKey { B , r B } A  B : r B DA F, Ack A  B : APubKey { B , r B } DA F, NoAck A  B : APubKey { B } DA  Destination Authentication (DA) A  B : r B A  B : APriKey { B , r B } OA F A  B : TS A , APriKey { B , TS A } OA S A  B : APriKey { B } OA  Origin Authentication (OA) A  B : r B A: Ap riKey { B , r B } IA F A : ApriKey { B } IA Ø Implicit Authentication (IA) Example Authentication Type
  • 17. Prototypes of Mutual Authentication 1. A  B: r A 2. A  B: r B A: APriKey { B , r B } B: BPriKey { A , r A } IA F -IA F A: APriKey { B } B: BPriKey { A }     1. A  B: BPubKey { A } DA   1. A  B: r A B: IA F-  Example Prototype
  • 18. Prototypes of Mutual Authentication 1. A  B: r A 2. A  B: APubKey { B , r B , BPriKey { A , r A } } or, 1. A  B: r A 2. A  B: BPriKey { A , r A , APubKey { B , r B } } OA F - DA F , NoAck 1. A  B: r A 2. A  B: BPriKey { A , r A }, r B 3. A  B: APrikey { B , r B } OA F -OA F 1. A  B: r A , TS A , APriKey { B , TS A } B: BPriKey { r A } IA F -OA S Example Prototype
  • 19. Prototypes of Mutual Authentication 1. A  B: BPubKey { A , r A } 2. A  B: APubKey { B , r B }, r A 3. A  B: r B DA F,Ack -DA F,Ack 1. A  B: BPubKey { A , r A } 2. A  B: APubKey { B , r B } DA F,NoAck -DA F,NoAck 1. A  B: BPubKey { A , r A } 2. A  B: r A , r B 3. A  B: APriKey { B , r B } DA F,Ack -OA F 1. A  B: BPubKey { A , r A , TS A , APriKey { B , TS A } } or, 1. A  B: TSA , APriKey { B , TS A , BPubKey { A , r A } } DA F,NoAck -OA S Example Prototype
  • 20.
  • 21.
  • 22.
  • 23.

Hinweis der Redaktion

  1. . Origin Authentication (OA): If a protocol contains a message which is generated applying a private key on random nonce i.e. the message is of the form APriKey {·} then we say the protocol provides origin authentication of the entity . Destination Authentication (DA ): If a protocol contains a message which is generated by application of public key on randomly generated nonce i.e. the message is of the form APubKey {·} then it provides destination authentication of the entity A . Implicit Authentication (IA): If a protocol contains no message of the form APriKey {·} or APubKey {·}, but still requires entity A to compute a value of the form APriKey { ·}, then we say that the protocol provides implicit authentication of A.
  2. IA F -  ( Implicit Authentication with forced challenge and no msg from the prover ) implies that the message does not contain any message of the form APriKey {·} or ApubKey {·}, but still requires the verifier (A ) to compute a value of the form ApriKey { ·} and there is no subsequent response from the prover (B) it just computes the msg BPriKey { r A } for eg. ISO/IEC key agreement mechanism 2 DA   ( Destination Authentication with forced challenge and no message from the prover) implies the verifier does not contain any message of the form APriKey {·} or ApubKey {·}, and asks the prover to compute message BPubKey { A } which it keeps with itself and does not send it back to the verifier for eg. ISO/IEC key transport mechanism 1 IA  -IA   (Implicit Authentication with no challenge- Implicit Authentication with no challenge): There is no message exchange of the form APriKey {·} or ApubKey {·}, and both entities A and B generate data of the form A: APriKey { B } B: BPriKey { A }, respectively Eg. ISO/IEC key agreement mechanism 1 IA F -IA F (Implicit Authentication with forced challenge- Implicit Authentication with forced challenge) : Both entities A and B exchange random nonce r a and r b to compute A: APriKey { B , r B }, B: BPriKey { A , r A } respectively and no message exchange of the form APriKey {·} or ApubKey {·} takes place. Eg ISO/IEC key agreement mechanism 5, Goss protocol.
  3. IA F -OA S Implicit Authentication with forced challenge-Origin Authentication with self challenge In this protocol the verifier A sends a random nonce, time stamp and the message APriKey {B, TS A } and the prover generates the message BPriKey {r A } its examples include ISO/IEC key agreement mechanism 3, Nyberg-Rueppel key agreement protocol Origin Authentication with forced challenge - Origin Authentication with forced challenge is the class of those types of protocols where the prover gets the random nonce r A from the verifier encrypts in to the form BPriKey { A , r A }, r B and the receiver send the message of the form APriKey {B, r B }, eg ISO/IEC key transport mechanism 5, ASPeCT protocol for UMTS OA F - DA F , NoAck (Origin Authentication with forced challenge – destination authentication with forced challenge and no acknowledgment ) describes the protocols where the random nonce generated at the receiver end and the prover send a data of the form APubKey it may contain a nested encrypted values. ISO/IEC key transport mechanism 4, Beller-Yacobi’ s two-pass protocol
  4. DA F,NoAck -OA S Destination Authentication with forced challenge and no acknowledgment and Origin Authentication with self challenge have just one message exchange, since it is a self challenge it may contain some time stamp. Verifier A sends the message which contains A’s Private key encrypted message embed inside a public key encrypted message of prover B along with its time stamp or B’s Public Key message inside A’s private Key’s message. Eg. ISO/IEC key transport mechanism 2, North American PACS public key AKA protocol. DA F,Ack -OA F Destination Authentication with forced challenge and Acknowledgment and Origin Authentication with forced challenge has the message exchange such that A sends public key encrypted message to B which responds by sending decrypted nonce r A and its own generated random nonce r B . Verifier then sends private decrypted message back to the prover to authenticate himself eg Boyd-Park protocol The last two prototypes namely DA F,NoAck -DA F,NoAck ( Destination Authentication with no acknowledgment- Destination Authentication with no acknowledgment) and DA F,Ack -DA F,Ack ( Destination Authentication with acknowledgment- Destination Authentication with acknowledgment) have similar message exchange i.e. A sending message encrypted as BPubKey {} and B sending a message as APubKey {}, the only difference bieng with the fact that as latter is a prototype with acknowledgment, we have acknowledgments in the form or r A and r B ’s respectively . Eg. SKEME protocol ( DA F,NoAck -DA F,NoAck ) and ISO/IEC key transport mechanism 6, Needham-Schroeder public key protocol ( both for DA F,Ack -DA F,Ack )