Secret Key Authentication with Software-Only Verification

  • Authors:
  • Jaap-Henk Hoepman

  • Affiliations:
  • -

  • Venue:
  • FC '00 Proceedings of the 4th International Conference on Financial Cryptography
  • Year:
  • 2000

Quantified Score

Hi-index 0.00

Visualization

Abstract

Two protocols for authentication based on symmetric key. cryptography are described, where the verifier can be implemented in software completely, without, the need for secure storage of any secret information. The protocols use a symmetric cipher in an asymmetric fashion: the verifier uses a verification key, which is derived from a symmetric master key.Software only verification means that the verifier does not have to be equipped with some tamper resistant device storing the verification keys. The protocols are especially suitable for the smart card enrironment where symmetric key protocols are extensively used, and will be used for some time to come, to reduce both system cost and transaction time.