SlideShare una empresa de Scribd logo
1 de 24
A Survey of RFID Authentication Protocols Compiled by : Dr. Vidyasagar Potdar Yawer Yousuf Khan
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RFID Architecture ,[object Object],Semi Passive Active Passive
RFID Architecture (cont.) Operational Process
RFID Architecture (cont.) RFID Architecture
Applications of RFID ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Issues ,[object Object],[object Object],[object Object],[object Object],[object Object]
Types of attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Classification of Authentication Protocols: what, why and how? ,[object Object],[object Object],[object Object]
Classification of Authentication Protocols: what, why and how? ,[object Object],[object Object],[object Object],[object Object]
Classification of Authentication Protocols: what, why and how? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Preliminary Concepts ,[object Object],[object Object],[object Object],[object Object]
Preliminary Concepts ,[object Object],[object Object],[object Object],[object Object]
Process of Classification ,[object Object],[object Object],[object Object]
Process of Classification ,[object Object],[object Object],[object Object],[object Object],[object Object]
Prototypes of Authentication A   B :  APubKey {  B ,  r B   } A   B :  r B DA F, Ack A   B :  APubKey {  B ,  r B   } DA F, NoAck A   B :  APubKey {  B  } DA  Destination Authentication (DA) A   B :  r B   A  B :  APriKey  {  B ,  r B   } OA F A   B :  TS A   ,  APriKey {  B ,  TS A   } OA S A   B :  APriKey {  B  } OA   Origin Authentication (OA) A   B :  r B   A: Ap riKey  {  B ,  r B   } IA F A :  ApriKey {  B  } IA Ø Implicit Authentication (IA) Example Authentication Type
Prototypes of Mutual Authentication 1. A   B:  r A 2. A   B:  r B A:  APriKey {  B ,  r B   } B:  BPriKey {  A ,  r A   } IA F -IA F A:  APriKey {  B  } B:  BPriKey {  A  }     1. A   B:  BPubKey {  A  } DA   1. A  B:  r A B: IA F-  Example Prototype
Prototypes of Mutual Authentication 1. A   B:  r A 2. A  B:  APubKey { B ,  r B   ,  BPriKey {  A ,  r A   } } or, 1. A   B:  r A 2. A   B:  BPriKey {  A ,  r A   ,  APubKey { B ,  r B   } } OA F -   DA F , NoAck 1. A   B:  r A 2. A   B:  BPriKey {  A ,  r A   },  r B 3. A   B:  APrikey {  B ,  r B   } OA F -OA F 1. A   B:  r A   ,  TS A   ,  APriKey {  B ,  TS A   } B:  BPriKey {  r A   } IA F -OA S Example Prototype
Prototypes of Mutual Authentication 1. A   B:  BPubKey {  A ,  r A   } 2. A  B:  APubKey {  B ,  r B  },  r A 3. A  B:  r B DA F,Ack -DA F,Ack 1. A  B:  BPubKey {  A ,  r A   } 2. A   B:  APubKey {  B ,  r B   } DA F,NoAck -DA F,NoAck 1. A   B:  BPubKey {  A ,  r A   } 2. A   B:  r A   ,  r B 3. A  B:  APriKey {  B ,  r B   } DA F,Ack -OA F 1. A   B:  BPubKey { A ,  r A  ,  TS A  ,  APriKey {  B ,  TS A   } } or, 1. A   B:  TSA  ,  APriKey {  B ,  TS A   ,  BPubKey { A ,  r A   } } DA F,NoAck -OA S Example Prototype
Minimalist Approach ,[object Object],[object Object],[object Object]
Minimalist Approach ,[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You

Más contenido relacionado

Similar a Survey paper

IMPERSONATION ATTACK ON EKE PROTOCOL
IMPERSONATION ATTACK ON EKE PROTOCOLIMPERSONATION ATTACK ON EKE PROTOCOL
IMPERSONATION ATTACK ON EKE PROTOCOLIJNSA Journal
 
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...IJNSA Journal
 
Wpmc2004 phy protection
Wpmc2004 phy protectionWpmc2004 phy protection
Wpmc2004 phy protectionArpan Pal
 
E Snet Authentication Fabric Pilot
E Snet Authentication Fabric PilotE Snet Authentication Fabric Pilot
E Snet Authentication Fabric PilotFNian
 
RFID Talk
RFID TalkRFID Talk
RFID Talkmasud80
 
Computational science guided soft
Computational science guided softComputational science guided soft
Computational science guided softijcsa
 
Improved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network AuthenticationImproved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network AuthenticationGovind Maheswaran
 
Semantics and optimisation of the SPARQL1.1 federation extension
Semantics and optimisation of the SPARQL1.1 federation extensionSemantics and optimisation of the SPARQL1.1 federation extension
Semantics and optimisation of the SPARQL1.1 federation extensionOscar Corcho
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...IRJET Journal
 
Identity-Based Blind Signature Scheme with Message Recovery
Identity-Based Blind Signature Scheme with Message Recovery Identity-Based Blind Signature Scheme with Message Recovery
Identity-Based Blind Signature Scheme with Message Recovery IJECEIAES
 
Hamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar DecoderHamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar DecoderRSIS International
 
IP Security in Network Security NS6
IP Security in Network Security NS6IP Security in Network Security NS6
IP Security in Network Security NS6koolkampus
 

Similar a Survey paper (20)

IMPERSONATION ATTACK ON EKE PROTOCOL
IMPERSONATION ATTACK ON EKE PROTOCOLIMPERSONATION ATTACK ON EKE PROTOCOL
IMPERSONATION ATTACK ON EKE PROTOCOL
 
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
 
Arp Cache Poisoning
Arp Cache PoisoningArp Cache Poisoning
Arp Cache Poisoning
 
Ip Sec
Ip SecIp Sec
Ip Sec
 
Wpmc2004 phy protection
Wpmc2004 phy protectionWpmc2004 phy protection
Wpmc2004 phy protection
 
ma52009id420
ma52009id420ma52009id420
ma52009id420
 
An effective RC4 Stream Cipher
An effective RC4 Stream CipherAn effective RC4 Stream Cipher
An effective RC4 Stream Cipher
 
Ip Sec
Ip SecIp Sec
Ip Sec
 
Ip Sec Rev1
Ip Sec Rev1Ip Sec Rev1
Ip Sec Rev1
 
E Snet Authentication Fabric Pilot
E Snet Authentication Fabric PilotE Snet Authentication Fabric Pilot
E Snet Authentication Fabric Pilot
 
RFID Talk
RFID TalkRFID Talk
RFID Talk
 
12 tcp-dns
12 tcp-dns12 tcp-dns
12 tcp-dns
 
Computational science guided soft
Computational science guided softComputational science guided soft
Computational science guided soft
 
Improved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network AuthenticationImproved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network Authentication
 
Semantics and optimisation of the SPARQL1.1 federation extension
Semantics and optimisation of the SPARQL1.1 federation extensionSemantics and optimisation of the SPARQL1.1 federation extension
Semantics and optimisation of the SPARQL1.1 federation extension
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
 
SVQdotNET: Building APIs with OpenApi
SVQdotNET: Building APIs with OpenApiSVQdotNET: Building APIs with OpenApi
SVQdotNET: Building APIs with OpenApi
 
Identity-Based Blind Signature Scheme with Message Recovery
Identity-Based Blind Signature Scheme with Message Recovery Identity-Based Blind Signature Scheme with Message Recovery
Identity-Based Blind Signature Scheme with Message Recovery
 
Hamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar DecoderHamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar Decoder
 
IP Security in Network Security NS6
IP Security in Network Security NS6IP Security in Network Security NS6
IP Security in Network Security NS6
 

Último

8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...ShrutiBose4
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024Matteo Carbone
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 

Último (20)

8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 

Survey paper

  • 1. A Survey of RFID Authentication Protocols Compiled by : Dr. Vidyasagar Potdar Yawer Yousuf Khan
  • 2.
  • 3.
  • 4. RFID Architecture (cont.) Operational Process
  • 5. RFID Architecture (cont.) RFID Architecture
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Prototypes of Authentication A  B : APubKey { B , r B } A  B : r B DA F, Ack A  B : APubKey { B , r B } DA F, NoAck A  B : APubKey { B } DA  Destination Authentication (DA) A  B : r B A  B : APriKey { B , r B } OA F A  B : TS A , APriKey { B , TS A } OA S A  B : APriKey { B } OA  Origin Authentication (OA) A  B : r B A: Ap riKey { B , r B } IA F A : ApriKey { B } IA Ø Implicit Authentication (IA) Example Authentication Type
  • 17. Prototypes of Mutual Authentication 1. A  B: r A 2. A  B: r B A: APriKey { B , r B } B: BPriKey { A , r A } IA F -IA F A: APriKey { B } B: BPriKey { A }     1. A  B: BPubKey { A } DA   1. A  B: r A B: IA F-  Example Prototype
  • 18. Prototypes of Mutual Authentication 1. A  B: r A 2. A  B: APubKey { B , r B , BPriKey { A , r A } } or, 1. A  B: r A 2. A  B: BPriKey { A , r A , APubKey { B , r B } } OA F - DA F , NoAck 1. A  B: r A 2. A  B: BPriKey { A , r A }, r B 3. A  B: APrikey { B , r B } OA F -OA F 1. A  B: r A , TS A , APriKey { B , TS A } B: BPriKey { r A } IA F -OA S Example Prototype
  • 19. Prototypes of Mutual Authentication 1. A  B: BPubKey { A , r A } 2. A  B: APubKey { B , r B }, r A 3. A  B: r B DA F,Ack -DA F,Ack 1. A  B: BPubKey { A , r A } 2. A  B: APubKey { B , r B } DA F,NoAck -DA F,NoAck 1. A  B: BPubKey { A , r A } 2. A  B: r A , r B 3. A  B: APriKey { B , r B } DA F,Ack -OA F 1. A  B: BPubKey { A , r A , TS A , APriKey { B , TS A } } or, 1. A  B: TSA , APriKey { B , TS A , BPubKey { A , r A } } DA F,NoAck -OA S Example Prototype
  • 20.
  • 21.
  • 22.
  • 23.

Notas del editor

  1. . Origin Authentication (OA): If a protocol contains a message which is generated applying a private key on random nonce i.e. the message is of the form APriKey {·} then we say the protocol provides origin authentication of the entity . Destination Authentication (DA ): If a protocol contains a message which is generated by application of public key on randomly generated nonce i.e. the message is of the form APubKey {·} then it provides destination authentication of the entity A . Implicit Authentication (IA): If a protocol contains no message of the form APriKey {·} or APubKey {·}, but still requires entity A to compute a value of the form APriKey { ·}, then we say that the protocol provides implicit authentication of A.
  2. IA F -  ( Implicit Authentication with forced challenge and no msg from the prover ) implies that the message does not contain any message of the form APriKey {·} or ApubKey {·}, but still requires the verifier (A ) to compute a value of the form ApriKey { ·} and there is no subsequent response from the prover (B) it just computes the msg BPriKey { r A } for eg. ISO/IEC key agreement mechanism 2 DA   ( Destination Authentication with forced challenge and no message from the prover) implies the verifier does not contain any message of the form APriKey {·} or ApubKey {·}, and asks the prover to compute message BPubKey { A } which it keeps with itself and does not send it back to the verifier for eg. ISO/IEC key transport mechanism 1 IA  -IA   (Implicit Authentication with no challenge- Implicit Authentication with no challenge): There is no message exchange of the form APriKey {·} or ApubKey {·}, and both entities A and B generate data of the form A: APriKey { B } B: BPriKey { A }, respectively Eg. ISO/IEC key agreement mechanism 1 IA F -IA F (Implicit Authentication with forced challenge- Implicit Authentication with forced challenge) : Both entities A and B exchange random nonce r a and r b to compute A: APriKey { B , r B }, B: BPriKey { A , r A } respectively and no message exchange of the form APriKey {·} or ApubKey {·} takes place. Eg ISO/IEC key agreement mechanism 5, Goss protocol.
  3. IA F -OA S Implicit Authentication with forced challenge-Origin Authentication with self challenge In this protocol the verifier A sends a random nonce, time stamp and the message APriKey {B, TS A } and the prover generates the message BPriKey {r A } its examples include ISO/IEC key agreement mechanism 3, Nyberg-Rueppel key agreement protocol Origin Authentication with forced challenge - Origin Authentication with forced challenge is the class of those types of protocols where the prover gets the random nonce r A from the verifier encrypts in to the form BPriKey { A , r A }, r B and the receiver send the message of the form APriKey {B, r B }, eg ISO/IEC key transport mechanism 5, ASPeCT protocol for UMTS OA F - DA F , NoAck (Origin Authentication with forced challenge – destination authentication with forced challenge and no acknowledgment ) describes the protocols where the random nonce generated at the receiver end and the prover send a data of the form APubKey it may contain a nested encrypted values. ISO/IEC key transport mechanism 4, Beller-Yacobi’ s two-pass protocol
  4. DA F,NoAck -OA S Destination Authentication with forced challenge and no acknowledgment and Origin Authentication with self challenge have just one message exchange, since it is a self challenge it may contain some time stamp. Verifier A sends the message which contains A’s Private key encrypted message embed inside a public key encrypted message of prover B along with its time stamp or B’s Public Key message inside A’s private Key’s message. Eg. ISO/IEC key transport mechanism 2, North American PACS public key AKA protocol. DA F,Ack -OA F Destination Authentication with forced challenge and Acknowledgment and Origin Authentication with forced challenge has the message exchange such that A sends public key encrypted message to B which responds by sending decrypted nonce r A and its own generated random nonce r B . Verifier then sends private decrypted message back to the prover to authenticate himself eg Boyd-Park protocol The last two prototypes namely DA F,NoAck -DA F,NoAck ( Destination Authentication with no acknowledgment- Destination Authentication with no acknowledgment) and DA F,Ack -DA F,Ack ( Destination Authentication with acknowledgment- Destination Authentication with acknowledgment) have similar message exchange i.e. A sending message encrypted as BPubKey {} and B sending a message as APubKey {}, the only difference bieng with the fact that as latter is a prototype with acknowledgment, we have acknowledgments in the form or r A and r B ’s respectively . Eg. SKEME protocol ( DA F,NoAck -DA F,NoAck ) and ISO/IEC key transport mechanism 6, Needham-Schroeder public key protocol ( both for DA F,Ack -DA F,Ack )