Authentication Without Secrets
- Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.
- Research Organization:
- Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)
- Sponsoring Organization:
- USDOE National Nuclear Security Administration (NNSA)
- DOE Contract Number:
- AC04-94AL85000
- OSTI ID:
- 1226788
- Report Number(s):
- SAND2015--10101; 608285
- Country of Publication:
- United States
- Language:
- English
Similar Records
Authentication techniques for smart cards
Authentication Protocol for ICS without Encryption
How to reuse a one-time pad and other notes on authentication, encryption, and protection of quantum information
Conference
·
Mon Jan 31 23:00:00 EST 1994
·
OSTI ID:10141490
Authentication Protocol for ICS without Encryption
Conference
·
Mon Jul 01 00:00:00 EDT 2019
·
OSTI ID:23005528
How to reuse a one-time pad and other notes on authentication, encryption, and protection of quantum information
Journal Article
·
Sat Oct 15 00:00:00 EDT 2005
· Physical Review. A
·
OSTI ID:20718702