Logical authentication method

  • Authors:
  • David Lipton

  • Affiliations:
  • -

  • Venue:
  • ACM SIGSAC Review
  • Year:
  • 1986

Quantified Score

Hi-index 0.00

Visualization

Abstract

A logical authentication test requires no special hardware. As a proof of identity, the accessor is required to know or to use secret information. In a generalized model of logical authentication, the user learns an encryption algorithm whose functional description is secret. This model includes new tests of secret knowledge which induce larger forgery costs in certain environments than methods currently in wide-spread use.