Browse Prior Art Database

Cryptographic Authentication Using Test Patterns

IP.com Disclosure Number: IPCOM000047385D
Original Publication Date: 1983-Nov-01
Included in the Prior Art Database: 2005-Feb-07
Document File: 2 page(s) / 60K

Publishing Venue

IBM

Related People

Matyas, SM: AUTHOR

Abstract

This article discloses a method of authenticating time-invarient quantities using test patterns without the need for verification patterns. A data communication system may include a plurality of terminals operatively coupled to a host data processing system each having cryptographic apparatus for cryptographic data communications. In order to authenticate the identity of terminal users of the system, a host system initialization process is first performed to provide a table of test patterns for the terminal users for use during subsequent authentication processing.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 52% of the total text.

Page 1 of 2

Cryptographic Authentication Using Test Patterns

This article discloses a method of authenticating time-invarient quantities using test patterns without the need for verification patterns. A data communication system may include a plurality of terminals operatively coupled to a host data processing system each having cryptographic apparatus for cryptographic data communications. In order to authenticate the identity of terminal users of the system, a host system initialization process is first performed to provide a table of test patterns for the terminal users for use during subsequent authentication processing. The initialization process makes use of a cryptographic authentication operation called Authentication Reverse (AR) which is used only under secure conditions to create a test pattern, TPi, for each pair of IDi Xi, where IDi is the identifier of the user i and Xi is a parameter derived from secret information supplied by user i at the terminal and is used by the system to validate the user. Another way of defining the AR function is by the notation AR (IDi, Xi) T TPi, whereby the term AR indicates the function, the contents of the bracket indicates the input parameters, and the arrow points to the test pattern result. Fig. 1 illustrates the steps taken by the cryptographic facility to perform the AR function. Two authentication keys K0 and K1 are produced by enciphering a constant 0 and 1, respectively, under the fifth variant of the host master key. The input parameter Xi is enciphered under control of the authentication key K0 to yield the encrypted result EK0(Xi) while the authentication key K1 is Exclusive ORed with the input parameter IDi to yield the Exclusive OR result K1 0/IDi. This result is used as a cipher key to encipher the encrypted result EK0(Xi) to obtain values which represent the test patterns TPi associated with the IDi, Xi pairs. During authentication processing, a terminal user identification number and secret parameter are provided by the user at a terminal of...