Data Protection and Security |
||||||
VII |
Identification and Entity Authentication |
|||||
VII.III |
Authentication Protocols |
|||||
Challenge-Response Authentication Protocols: A very common enhancement of classical password based authentication is to introduce a cryptographic challenge/response protocol. We will first discuss protocols based on shared secret. The protocol in Figure 3 is composed of three steps:
The transformation could be done in a number of ways. It could be done by using the shared secret as a secret key to a secret-key encryption algorithm which takes the challenge as the plaintext and produces the corresponding ciphertext as the response or by computing the response as the hash value of the combination of the challenge and the shared secret.
Figure 3. Challenge-Response protocol based on a shared secret. This protocol is an improvement over passwords as no password is transmitted in plain. However it has a number of essential limitations. These are:
F(K,R) = F(Kalice-bob,R)
It is possible to make this protocol more efficient and reduce it to a one-round protocol by using timestamps instead of challenge/response. One nice feature of challenge/response protocols is that it is not possible to replay the response messages because if the challenge is chosen from a sufficiently large space, no two challenges are the same and therefore all responses should be different. Since it is not possible to go back in time, the current time value can be used like the unique challenge Bob provides if Bob and Alice have a synchronized clock value. Of course even when clocks are perfectly synchronized, Bob should accept the result with acceptable clock skew because of the transmission delay between two parties. Figure 4. Authentication protocol based on a timestamp and a shared secret. Note: The protocols based on public key cryptography eliminates the problem related to database reading since two parties no longer share a secret. |
||||||
|
||||||
|
chapter index | |||||