Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Challenge–Response Identification

  • Reference work entry
Encyclopedia of Cryptography and Security
  • 184 Accesses

In its simplest form, an identification protocol involves the presentation or submission of some information (a “secret value”) from a claimant to a verifier (see Identification). Challenge–response identification is an extension in which the information submitted by the claimant is the function of both a secret value known to the claimant (sometimes called a “prover”), and a challenge value received from the verifier (or “challenger”).

Such a challenge–response protocol proceeds as follows. A verifier V generates and sends a challenge value c to the claimant C. Using his/her secret value s and appropriate function f(), C computes the response value \(v=f {\rm (}c,s{\rm )}\), and returns v to V. V verifies the response value v, and if successful, the claim is accepted. Choices for the challenge value c, and additionally options for the function f() and secret s are discussed below.

Challenge–response identification is an improvement over simpler identification because it offers...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Menezes, A., P. van Oorschot, and S. Vanstone (1997). Handbook of Applied Cryptography. CRC Press, Boca Raton, FL.

    MATH  Google Scholar 

  2. Stinson, D.R. (1995). Cryptography: Theory and Practice. CRC Press, Boca Raton, FL.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Just, M. (2005). Challenge–Response Identification. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_56

Download citation

Publish with us

Policies and ethics