Publication detail

Unilateral Authentication on Low-cost Devices

ČLUPEK, V. ZEMAN, V.

Original Title

Unilateral Authentication on Low-cost Devices

English Title

Unilateral Authentication on Low-cost Devices

Type

conference paper

Language

en

Original Abstract

This paper deals with unilateral authentication on low-cost devices. Security properties for secure authentication protocol are specified herein. Based on these security properties we proposed four simple unilateral authentication protocols. Protocol for unilateral authentication using symmetric cipher, protocol for unilateral authentication using a HMAC function, protocol for unilateral authentication using a hash function and protocol for unilateral authentication using permutation. Their security against common attacks is discussed.

English abstract

This paper deals with unilateral authentication on low-cost devices. Security properties for secure authentication protocol are specified herein. Based on these security properties we proposed four simple unilateral authentication protocols. Protocol for unilateral authentication using symmetric cipher, protocol for unilateral authentication using a HMAC function, protocol for unilateral authentication using a hash function and protocol for unilateral authentication using permutation. Their security against common attacks is discussed.

Keywords

Cryptography; Low-cost devices; Security properties; Unilateral authentication

RIV year

2015

Released

11.07.2015

ISBN

978-1-4799-8497-8

Book

TSP 2015

Pages from

88

Pages to

92

Pages count

5

URL

Documents

BibTex


@inproceedings{BUT115248,
  author="Vlastimil {Člupek} and Václav {Zeman}",
  title="Unilateral Authentication on Low-cost Devices",
  annote="This paper deals with unilateral authentication on low-cost devices. Security properties for secure authentication protocol are specified herein. Based on these security properties we proposed four simple unilateral authentication protocols. Protocol for unilateral authentication using symmetric cipher, protocol for unilateral authentication using a HMAC function, protocol for unilateral authentication using a hash function and protocol for unilateral authentication using permutation. Their security against common attacks is discussed.",
  booktitle="TSP 2015",
  chapter="115248",
  doi="10.1109/TSP.2015.7296229",
  howpublished="electronic, physical medium",
  year="2015",
  month="july",
  pages="88--92",
  type="conference paper"
}