Invention Patent
- Patent Title: AUTHENTICATION PROTOCOLS IN COMMUNICATION NETWORKS
-
Application No.: CA2059172Application Date: 1992-01-10
-
Publication No.: CA2059172CPublication Date: 1996-01-16
- Inventor: BIRD RAYMOND F , GOPAL INDER S , JANSON PHILIPPE A , KUTTEN SHAY , MOLVA REFIK A , YUNG MARCEL M
- Applicant: IBM
- Assignee: IBM
- Current Assignee: IBM
- Priority: US67222691 1991-03-20
- Main IPC: H04L9/06
- IPC: H04L9/06 ; G06F21/00 ; G09C1/00 ; H04L9/14 ; H04L9/32 ; H04L12/22 ; H04K1/00
Abstract:
A arrangement of authenticating communications network users and means for carrying out the arrangement: A first challenge N1 is transmitted from a first user A to a second user B. In response to the first challenge, B generates and transmits a first response to the challenge and second challenge N2 to A. A verifies that the first response is correct. A then generates and transmits a second response to the second challenge to B, where the second response is verified. The first response must be of a minimum form S1 and S2 are shared secrets between A and B. S1 may or may not equal to S2. In addition, f() and g() are selected such that the equation f'(S1,N1'....) = g(S2.N2) cannot be solved for N1' without knowledge of S1 and S2. f'() and N1' represent expressions on a second reference connection. Preferably, the function f() may include the direction D1 of flow of the message containing f(), as in f(S1, N1, D1,...). In such a case, f() is selected such that the equation f'(S, N1',D1',...) = f(S, N2, D1,...) cannot be solved for N1' without knowledge of S1 and S2. In this equation, D1' is the flow direction indicator of the message containing f'() on the reference connection. Specific protocols satisfying this condition are protected from so-called intercept attacks.
Public/Granted literature
- CA2059172A1 AUTHENTICATION PROTOCOLS IN COMMUNICATION NETWORKS Public/Granted day:1992-09-21
Information query