Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Authentication Without Secrets

Technical Report ·
DOI:https://doi.org/10.2172/1226788· OSTI ID:1226788
 [1];  [1]
  1. Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.
Research Organization:
Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)
Sponsoring Organization:
USDOE National Nuclear Security Administration (NNSA)
DOE Contract Number:
AC04-94AL85000
OSTI ID:
1226788
Report Number(s):
SAND2015--10101; 608285
Country of Publication:
United States
Language:
English

Similar Records

Authentication techniques for smart cards
Conference · Mon Jan 31 23:00:00 EST 1994 · OSTI ID:10141490

Authentication Protocol for ICS without Encryption
Conference · Mon Jul 01 00:00:00 EDT 2019 · OSTI ID:23005528

How to reuse a one-time pad and other notes on authentication, encryption, and protection of quantum information
Journal Article · Sat Oct 15 00:00:00 EDT 2005 · Physical Review. A · OSTI ID:20718702

Related Subjects