Questions tagged [authentication]
Authentication is successfully validating that an entity you are communicating with is actually who they claim to be. The entity typically demonstrates who they are by showing they possess a secret that only they could know.
743 questions
4 votes
2 answers
429 views
Is Autonomous (OTP) One-Time Pad Establishment Feasible?
Is there a way for two parties, Alice and Bob (consider they are two remote systems communicating over an untrusted network), to establish or agree on a one-time pad (OTP) in an autonomous way? I mean:...
2 votes
1 answer
133 views
An example of the simplest possible "Mutual Authentication" when one party cannot generate random numbers?
The RFID specification is an "over the air" protocol where most devices are passively-powered. The most recent specification, Generation 2 Version 3, includes "mutual authentication&...
0 votes
2 answers
218 views
Can we make linkedin using blockchain
Can we make linkedin using blockchain, which may not be completely valid as the users registration can not be on-chain but we can verify job postings from companies, and users cant fake their ...
1 vote
0 answers
84 views
Are ID protocols functionally equivalent to digital signatures?
In PKC, it's common knowledge that key exchange and public-key encryption are functionally equivalent, and you can get one from the other. Barring semantic security definition difference of course. ...
4 votes
1 answer
197 views
For AES-GCM, why do protocols not use the nonce to prevent replay attacks?
For protocols using AES-GCM, it appears to be common practice to store the sequence number in the additional authenticated data (AES_GCM and TLS sequence number). I have not found any instances of ...
0 votes
1 answer
81 views
What are the weaknesses with using a hash with some secret data for basic authentication?
I'm working on a very simple and small embedded device. I don't have access to any signing hardware. I would like to have some basic authentication in place to be able to identify a user when a BLE ...
1 vote
0 answers
38 views
If public key shared with only one person, does successful decryption establish authenticity?
Disclaimer: This is a learning-oriented question. I'm not trying to design a new protocol or roll my own crypto. Suppose Alice has an RSA keypair. Alice shares the public key only with Bob. Bob wants ...
0 votes
0 answers
94 views
Seeking Open Research Problems in zk Cryptography for Military Applications
I am currently working on my thesis as a researcher specializing in zero-knowledge (zk) cryptography. My focus is on identifying and solving open research problems related to the application of zk ...