Mitchell, Chris (1989) Limitations of challenge-response entity authentication. Electronics Letters, 25 (17).
Full text access: Open
We consider two basic versions of the challenge-response authentication protocol, and exhibit both a method of attack and a simple modification preventing such attacks. We go on to consider three variants of the basic protocols and show that one of them is completely insecure.
This is a Submitted version This version's date is: 8/1989 This item is not peer reviewed
https://repository.royalholloway.ac.uk/items/c2121a5c-5521-6c26-1ef4-312ddf0ad688/4/
Deposited by Research Information System (atira) on 25-Jul-2012 in Royal Holloway Research Online.Last modified on 25-Jul-2012
©20xx IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.