Question: ( S / key Identification Scheme ) In the setting of one - time passwords, we have a client and a server that share a
Skey Identification Scheme
In the setting of onetime passwords, we have a client and a server that share a key, and the client has to prove his identity to the server. If an adversary can somehow steal the key from the server then all is lost. This is what happened to RSAs SecureID due to a hack at Lockheed Martin.
The SKey identification scheme is an alternative to onetime passwords in which the client and server have different keys Kc and Ks and the server key is public.
To set up the scheme, we generate a random string L $ k where k is sufficiently large, say k Let H be a cryptographic hash function eg HMACSHA Let Hn denote the nth iteration of H that is Hx Hx and Hix HHix for every i Then, the client key is Kc L n and the server key is Ks HnK for some integer n
The scheme is then stateful ie both the client and the server update Ks and Kc respectively Concretely, upon running on input key Kc Li for i n the client sends t HiL to the server, and sets Kc L i If i the client does not do anything.
a Given a verifier key Ks and a token t how should the server validate it How should it update the key Ks
b Explain informally why assuming H is a good hash function SKey is a secure identification scheme against eavesdropping attackers.
c How would you choose the value n Explain your choice.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
