The STUDIA UNIVERSITATIS BABE┼×-BOLYAI issue article summary

The summary of the selected article appears at the bottom of the page. In order to get back to the contents of the issue this article belongs to you have to access the link from the title. In order to see all the articles of the archive which have as author/co-author one of the authors mentioned below, you have to access the link from the author's name.

 
       
         
    STUDIA INFORMATICA - Issue no. Sp.Issue 2 / 2009  
         
  Article:   CHALLENGE-RESPONSE ENTITY AUTHENTICATION TECHNIQUES.

Authors:  HOREA OROS, FLORIAN MIRCEA BOIAN.
 
       
         
  Abstract:   Entity authentication is a process by which one party obtains evidence regarding the identity of a second party involved in a protocol, and that the second party effectively participated to the process, being active when the evidence is obtained or immediately prior to the time the evidence is acquired. This paper presents general techniques used in entity authentication protocols, techniques based on challenge-response mechanism. These techniques use time-variant parameters in the form of random numbers, sequence numbers or times-tamps. We investigate challenge-response techniques based on symmetric and asymmetric cryptography.

Key words and phrases. authentication, protocol, challenge-response, nonce.
 
         
     
         
         
      Back to previous page