×

Method and apparatus for two-way authentication without nonces

  • US 20080077795A1
  • Filed: 09/25/2007
  • Published: 03/27/2008
  • Est. Priority Date: 09/25/2006
  • Status: Abandoned Application
First Claim
Patent Images

1. A method and apparatus whereby two entities may authenticate each to the other comprising (a) a list of arbitrary length of key data serving as the keys for one of the entities, maintained in the storage of that entity and also maintained in the storage of the other entity, (b) optionally, a list of arbitrary length of data serving as values to be known as mutual anti-replay values, maintained in the storage of that entity and also maintained in the storage of the other entity, (c) a list of arbitrary length of key data serving as the keys for the other of the entities, maintained in the storage of that entity and also maintained in the storage of the first entity, (d) optionally, a list of arbitrary length of data serving as values to be known as mutual anti-replay values, maintained in the storage of the other of the entities and also maintained in the storage of the first entity, (e) indexes into these key lists maintained by each entity, (f) optionally, if independent lists of mutual anti-replay values are maintained, indexes into these lists of mutual anti-replay values, (g) optionally, if independent lists of mutual anti-replay values are not maintained, a pair of one-way computational functions which may be applied to the contents of the key lists each of which functions is computationally feasible but the inverse of which is computationally infeasible for an attacker, such that each function of the pair may be identical to or different from the other, to be used to generate values to be known as mutual anti-replay values in lieu of separate lists of such values, (h) another pair of one-way computational functions which may be applied to the contents of these lists each of which is computationally feasible but the inverse of which is computationally infeasible for an attacker, such that each function of the pair may be identical to or different from the other, to be used to generate values to be known as return values, (i) a compositing computational function which may be used to combine key and other values in such a way that the inverse of this combination may easily be computed, such that for one entity, in the role of authenticatee, to be authenticated to the other entity, in the role of authenticator, (a) if a separate list of mutual anti-replay values is maintained, the authenticator selects the current value from the list of mutual anti-replay values for the authenticatee, or (b) if a separate list of mutual anti-replay values is not maintained, the authenticator applies one of the mutual anti-replay value generating one-way functions to the current key in the authenticatee'"'"'s list of keys, generating a value known as the mutual anti-replay value, (c) the authenticator, at this or any point up to the receipt of authentication data back from the authenticatee, computes the application of the composition function to the mutual anti-replay value so generated and the current key in the authenticatee'"'"'s list, and then computes the application of one of the return-value generating functions to this composition, using the return-value generating function to be used by the authenticatee in generating a return value in (i) below, (d) the authenticator transmits the mutual anti-replay value to the authenticatee, (e) if separate lists of mutual anti-replay values is maintained, the authenticatee selects the current value from its list, or (f) if a separate list of mutual anti-replay values is not maintained, the authenticatee applies the mutual anti-replay value one-way function to the current key in its list of keys, generating a value which would in the absence of attacks or operational difficulties be identical to the anti-replay value it has received from the authenticator, (g) the authenticatee compares the mutual anti-replay value as received at (d) with either the value so selected at (e) or the value so computed in (f) and, if they are identical, continues, but, if they differ, aborts the authentication protocol and optionally signals an error condition or warning alarm, (h) if the authentication protocol is to continue, then the authenticatee computes the combination of this anti-replay value so received with the current key in its list of keys, using the same composition function used in (c) above by the authenticator, (i) the authenticatee computes the application of one the same return-value generating one-way function used by the authenticator in (c) above by the authenticator to this composite value, (j) the authenticatee transmits this result, called the return value, to the authenticator, (k) the authenticator compares this value with the presumably identical value that it has previously computed, (l) and if these two values match, then the authenticator concludes that the authentication of the authenticatee has occurred, (m) this protocol is executed again, either simultaneously, interleaved, or serially, with the roles of authenticator and authenticatee reversed between the entities, to accomplish this second direction of authentication, (n) the authenticator and authenticatee increment their indexes into the key lists at such points in the protocol after which these indexes are no longer required for the current exchange in either direction of authentication.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×