A Novel Stateless Authentication Protocol
The value of authentication protocols which minimise (or even eliminate) the need for stored state in addressing DoS attacks is well-established — the seminal paper of Aura and Nikander  is of particular importance in this context. However, although there is now a substantial literature on this topic, it would seem that many aspects of stateless security protocols remain to be explored. In this paper we consider the design of a novel stateless authentication protocol which has certain implementation advantages. Specifically, neither party needs to maintain significant stored state. The protocol is developed as a series of refinements, at each step eliminating certain undesirable properties arising in previous steps.
KeywordsAuthentication Scheme Authentication Protocol Security Protocol Mutual Authentication Multimedia Security
Unable to display preview. Download preview PDF.
- 2.Boyd, C.A., Mathuria, A.: Protocols for key establishment and authentication. Springer (2003)Google Scholar
- 3.Orman, H.: RFC 2412, The OAKLEY key determination protocol. Internet Engineering Task Force (1998)Google Scholar
- 4.Karn, P., Simpson, W.: RFC 2522, Photuris: Session-key management protocol. Internet Engineering Task Force (1999)Google Scholar
- 5.Oppliger, R.: Protecting key exchange and management protocols against resource clogging attacks. In: Preneel, B. (ed.) Secure Information Networks: Communications and Multimedia Security, IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security, CMS 1999, Leuven, Belgium, September 20-21. IFIP Conference Proceedings, vol. 152, pp. 163–175. Kluwer (1999)Google Scholar
- 7.International Organization for Standardization Genève, Switzerland: ISO/IEC 9798–4: 1999/Cor 1:2009, Technical Corrigendum 1 (2009)Google Scholar
- 8.International Organization for Standardization Genève, Switzerland: ISO/IEC 9798–4: 1999, Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function, 2nd edn. (1999)Google Scholar