Construction Techniques For One-Way Chains And Their Use In Authentication

Bogdan Groza

Abstract



Authentication is one of the most important security objectives. The use of one-way chains in authentication was proved to be a very successful technique which encountered applications even in constrained environments such as ah-hoc sensor networks. This paper surveys some of the most efficient construction techniques for one-way chains and some of the most prominent authentication protocols that can be built on them. In brief, the construction techniques for one-way chains are categorized in two classes: one-way chains constructed from symmetric primitives and one-way chains constructed from asymmetric primitives. One-way chains were initially proposed for entity authentication; later their use will prove to be more successful in protocols for assuring information authenticity. We also categorize these protocols in two classes: protocols involving time synchronization and protocols involving an authentic confirmation.

Full Text: PDF