SlideShare a Scribd company logo
A Survey of RFID Authentication Protocols Compiled by : Dr. Vidyasagar Potdar Yawer Yousuf Khan
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RFID Architecture ,[object Object],Semi Passive Active Passive
RFID Architecture (cont.) Operational Process
RFID Architecture (cont.) RFID Architecture
Applications of RFID ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Issues ,[object Object],[object Object],[object Object],[object Object],[object Object]
Types of attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Classification of Authentication Protocols: what, why and how? ,[object Object],[object Object],[object Object]
Classification of Authentication Protocols: what, why and how? ,[object Object],[object Object],[object Object],[object Object]
Classification of Authentication Protocols: what, why and how? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Preliminary Concepts ,[object Object],[object Object],[object Object],[object Object]
Preliminary Concepts ,[object Object],[object Object],[object Object],[object Object]
Process of Classification ,[object Object],[object Object],[object Object]
Process of Classification ,[object Object],[object Object],[object Object],[object Object],[object Object]
Prototypes of Authentication A   B :  APubKey {  B ,  r B   } A   B :  r B DA F, Ack A   B :  APubKey {  B ,  r B   } DA F, NoAck A   B :  APubKey {  B  } DA  Destination Authentication (DA) A   B :  r B   A  B :  APriKey  {  B ,  r B   } OA F A   B :  TS A   ,  APriKey {  B ,  TS A   } OA S A   B :  APriKey {  B  } OA   Origin Authentication (OA) A   B :  r B   A: Ap riKey  {  B ,  r B   } IA F A :  ApriKey {  B  } IA Ø Implicit Authentication (IA) Example Authentication Type
Prototypes of Mutual Authentication 1. A   B:  r A 2. A   B:  r B A:  APriKey {  B ,  r B   } B:  BPriKey {  A ,  r A   } IA F -IA F A:  APriKey {  B  } B:  BPriKey {  A  }     1. A   B:  BPubKey {  A  } DA   1. A  B:  r A B: IA F-  Example Prototype
Prototypes of Mutual Authentication 1. A   B:  r A 2. A  B:  APubKey { B ,  r B   ,  BPriKey {  A ,  r A   } } or, 1. A   B:  r A 2. A   B:  BPriKey {  A ,  r A   ,  APubKey { B ,  r B   } } OA F -   DA F , NoAck 1. A   B:  r A 2. A   B:  BPriKey {  A ,  r A   },  r B 3. A   B:  APrikey {  B ,  r B   } OA F -OA F 1. A   B:  r A   ,  TS A   ,  APriKey {  B ,  TS A   } B:  BPriKey {  r A   } IA F -OA S Example Prototype
Prototypes of Mutual Authentication 1. A   B:  BPubKey {  A ,  r A   } 2. A  B:  APubKey {  B ,  r B  },  r A 3. A  B:  r B DA F,Ack -DA F,Ack 1. A  B:  BPubKey {  A ,  r A   } 2. A   B:  APubKey {  B ,  r B   } DA F,NoAck -DA F,NoAck 1. A   B:  BPubKey {  A ,  r A   } 2. A   B:  r A   ,  r B 3. A  B:  APriKey {  B ,  r B   } DA F,Ack -OA F 1. A   B:  BPubKey { A ,  r A  ,  TS A  ,  APriKey {  B ,  TS A   } } or, 1. A   B:  TSA  ,  APriKey {  B ,  TS A   ,  BPubKey { A ,  r A   } } DA F,NoAck -OA S Example Prototype
Minimalist Approach ,[object Object],[object Object],[object Object]
Minimalist Approach ,[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You

More Related Content

Similar to Survey paper

IMPERSONATION ATTACK ON EKE PROTOCOL
IMPERSONATION ATTACK ON EKE PROTOCOLIMPERSONATION ATTACK ON EKE PROTOCOL
IMPERSONATION ATTACK ON EKE PROTOCOL
IJNSA Journal
 
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
IJNSA Journal
 
Arp Cache Poisoning
Arp Cache PoisoningArp Cache Poisoning
Arp Cache Poisoning
Subhash Kumar Singh
 
Ip Sec
Ip SecIp Sec
Wpmc2004 phy protection
Wpmc2004 phy protectionWpmc2004 phy protection
Wpmc2004 phy protectionArpan Pal
 
An effective RC4 Stream Cipher
An effective RC4 Stream CipherAn effective RC4 Stream Cipher
An effective RC4 Stream Cipher
Tharindu Weerasinghe
 
Ip Sec Rev1
Ip Sec Rev1Ip Sec Rev1
Ip Sec Rev1
Ram Dutt Shukla
 
E Snet Authentication Fabric Pilot
E Snet Authentication Fabric PilotE Snet Authentication Fabric Pilot
E Snet Authentication Fabric Pilot
FNian
 
RFID Talk
RFID TalkRFID Talk
RFID Talkmasud80
 
Computational science guided soft
Computational science guided softComputational science guided soft
Computational science guided soft
ijcsa
 
Improved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network AuthenticationImproved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network Authentication
Govind Maheswaran
 
Semantics and optimisation of the SPARQL1.1 federation extension
Semantics and optimisation of the SPARQL1.1 federation extensionSemantics and optimisation of the SPARQL1.1 federation extension
Semantics and optimisation of the SPARQL1.1 federation extension
Oscar Corcho
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
IRJET Journal
 
Identity-Based Blind Signature Scheme with Message Recovery
Identity-Based Blind Signature Scheme with Message Recovery Identity-Based Blind Signature Scheme with Message Recovery
Identity-Based Blind Signature Scheme with Message Recovery
IJECEIAES
 
Hamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar DecoderHamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar Decoder
RSIS International
 
IP Security in Network Security NS6
IP Security in Network Security NS6IP Security in Network Security NS6
IP Security in Network Security NS6koolkampus
 
Position Recognition of Node Duplication Attacks in Wireless Network
Position Recognition of Node Duplication Attacks in Wireless NetworkPosition Recognition of Node Duplication Attacks in Wireless Network
Position Recognition of Node Duplication Attacks in Wireless Network
IRJET Journal
 

Similar to Survey paper (20)

IMPERSONATION ATTACK ON EKE PROTOCOL
IMPERSONATION ATTACK ON EKE PROTOCOLIMPERSONATION ATTACK ON EKE PROTOCOL
IMPERSONATION ATTACK ON EKE PROTOCOL
 
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...
 
Arp Cache Poisoning
Arp Cache PoisoningArp Cache Poisoning
Arp Cache Poisoning
 
Ip Sec
Ip SecIp Sec
Ip Sec
 
Wpmc2004 phy protection
Wpmc2004 phy protectionWpmc2004 phy protection
Wpmc2004 phy protection
 
ma52009id420
ma52009id420ma52009id420
ma52009id420
 
An effective RC4 Stream Cipher
An effective RC4 Stream CipherAn effective RC4 Stream Cipher
An effective RC4 Stream Cipher
 
Ip Sec Rev1
Ip Sec Rev1Ip Sec Rev1
Ip Sec Rev1
 
Ip Sec
Ip SecIp Sec
Ip Sec
 
E Snet Authentication Fabric Pilot
E Snet Authentication Fabric PilotE Snet Authentication Fabric Pilot
E Snet Authentication Fabric Pilot
 
RFID Talk
RFID TalkRFID Talk
RFID Talk
 
12 tcp-dns
12 tcp-dns12 tcp-dns
12 tcp-dns
 
Computational science guided soft
Computational science guided softComputational science guided soft
Computational science guided soft
 
Improved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network AuthenticationImproved EAP-SRP in Wireless Network Authentication
Improved EAP-SRP in Wireless Network Authentication
 
Semantics and optimisation of the SPARQL1.1 federation extension
Semantics and optimisation of the SPARQL1.1 federation extensionSemantics and optimisation of the SPARQL1.1 federation extension
Semantics and optimisation of the SPARQL1.1 federation extension
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
 
Identity-Based Blind Signature Scheme with Message Recovery
Identity-Based Blind Signature Scheme with Message Recovery Identity-Based Blind Signature Scheme with Message Recovery
Identity-Based Blind Signature Scheme with Message Recovery
 
Hamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar DecoderHamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar Decoder
 
IP Security in Network Security NS6
IP Security in Network Security NS6IP Security in Network Security NS6
IP Security in Network Security NS6
 
Position Recognition of Node Duplication Attacks in Wireless Network
Position Recognition of Node Duplication Attacks in Wireless NetworkPosition Recognition of Node Duplication Attacks in Wireless Network
Position Recognition of Node Duplication Attacks in Wireless Network
 

Recently uploaded

Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Avirahi City Dholera
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
zechu97
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 

Recently uploaded (20)

Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 

Survey paper

  • 1. A Survey of RFID Authentication Protocols Compiled by : Dr. Vidyasagar Potdar Yawer Yousuf Khan
  • 2.
  • 3.
  • 4. RFID Architecture (cont.) Operational Process
  • 5. RFID Architecture (cont.) RFID Architecture
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Prototypes of Authentication A  B : APubKey { B , r B } A  B : r B DA F, Ack A  B : APubKey { B , r B } DA F, NoAck A  B : APubKey { B } DA  Destination Authentication (DA) A  B : r B A  B : APriKey { B , r B } OA F A  B : TS A , APriKey { B , TS A } OA S A  B : APriKey { B } OA  Origin Authentication (OA) A  B : r B A: Ap riKey { B , r B } IA F A : ApriKey { B } IA Ø Implicit Authentication (IA) Example Authentication Type
  • 17. Prototypes of Mutual Authentication 1. A  B: r A 2. A  B: r B A: APriKey { B , r B } B: BPriKey { A , r A } IA F -IA F A: APriKey { B } B: BPriKey { A }     1. A  B: BPubKey { A } DA   1. A  B: r A B: IA F-  Example Prototype
  • 18. Prototypes of Mutual Authentication 1. A  B: r A 2. A  B: APubKey { B , r B , BPriKey { A , r A } } or, 1. A  B: r A 2. A  B: BPriKey { A , r A , APubKey { B , r B } } OA F - DA F , NoAck 1. A  B: r A 2. A  B: BPriKey { A , r A }, r B 3. A  B: APrikey { B , r B } OA F -OA F 1. A  B: r A , TS A , APriKey { B , TS A } B: BPriKey { r A } IA F -OA S Example Prototype
  • 19. Prototypes of Mutual Authentication 1. A  B: BPubKey { A , r A } 2. A  B: APubKey { B , r B }, r A 3. A  B: r B DA F,Ack -DA F,Ack 1. A  B: BPubKey { A , r A } 2. A  B: APubKey { B , r B } DA F,NoAck -DA F,NoAck 1. A  B: BPubKey { A , r A } 2. A  B: r A , r B 3. A  B: APriKey { B , r B } DA F,Ack -OA F 1. A  B: BPubKey { A , r A , TS A , APriKey { B , TS A } } or, 1. A  B: TSA , APriKey { B , TS A , BPubKey { A , r A } } DA F,NoAck -OA S Example Prototype
  • 20.
  • 21.
  • 22.
  • 23.

Editor's Notes

  1. . Origin Authentication (OA): If a protocol contains a message which is generated applying a private key on random nonce i.e. the message is of the form APriKey {·} then we say the protocol provides origin authentication of the entity . Destination Authentication (DA ): If a protocol contains a message which is generated by application of public key on randomly generated nonce i.e. the message is of the form APubKey {·} then it provides destination authentication of the entity A . Implicit Authentication (IA): If a protocol contains no message of the form APriKey {·} or APubKey {·}, but still requires entity A to compute a value of the form APriKey { ·}, then we say that the protocol provides implicit authentication of A.
  2. IA F -  ( Implicit Authentication with forced challenge and no msg from the prover ) implies that the message does not contain any message of the form APriKey {·} or ApubKey {·}, but still requires the verifier (A ) to compute a value of the form ApriKey { ·} and there is no subsequent response from the prover (B) it just computes the msg BPriKey { r A } for eg. ISO/IEC key agreement mechanism 2 DA   ( Destination Authentication with forced challenge and no message from the prover) implies the verifier does not contain any message of the form APriKey {·} or ApubKey {·}, and asks the prover to compute message BPubKey { A } which it keeps with itself and does not send it back to the verifier for eg. ISO/IEC key transport mechanism 1 IA  -IA   (Implicit Authentication with no challenge- Implicit Authentication with no challenge): There is no message exchange of the form APriKey {·} or ApubKey {·}, and both entities A and B generate data of the form A: APriKey { B } B: BPriKey { A }, respectively Eg. ISO/IEC key agreement mechanism 1 IA F -IA F (Implicit Authentication with forced challenge- Implicit Authentication with forced challenge) : Both entities A and B exchange random nonce r a and r b to compute A: APriKey { B , r B }, B: BPriKey { A , r A } respectively and no message exchange of the form APriKey {·} or ApubKey {·} takes place. Eg ISO/IEC key agreement mechanism 5, Goss protocol.
  3. IA F -OA S Implicit Authentication with forced challenge-Origin Authentication with self challenge In this protocol the verifier A sends a random nonce, time stamp and the message APriKey {B, TS A } and the prover generates the message BPriKey {r A } its examples include ISO/IEC key agreement mechanism 3, Nyberg-Rueppel key agreement protocol Origin Authentication with forced challenge - Origin Authentication with forced challenge is the class of those types of protocols where the prover gets the random nonce r A from the verifier encrypts in to the form BPriKey { A , r A }, r B and the receiver send the message of the form APriKey {B, r B }, eg ISO/IEC key transport mechanism 5, ASPeCT protocol for UMTS OA F - DA F , NoAck (Origin Authentication with forced challenge – destination authentication with forced challenge and no acknowledgment ) describes the protocols where the random nonce generated at the receiver end and the prover send a data of the form APubKey it may contain a nested encrypted values. ISO/IEC key transport mechanism 4, Beller-Yacobi’ s two-pass protocol
  4. DA F,NoAck -OA S Destination Authentication with forced challenge and no acknowledgment and Origin Authentication with self challenge have just one message exchange, since it is a self challenge it may contain some time stamp. Verifier A sends the message which contains A’s Private key encrypted message embed inside a public key encrypted message of prover B along with its time stamp or B’s Public Key message inside A’s private Key’s message. Eg. ISO/IEC key transport mechanism 2, North American PACS public key AKA protocol. DA F,Ack -OA F Destination Authentication with forced challenge and Acknowledgment and Origin Authentication with forced challenge has the message exchange such that A sends public key encrypted message to B which responds by sending decrypted nonce r A and its own generated random nonce r B . Verifier then sends private decrypted message back to the prover to authenticate himself eg Boyd-Park protocol The last two prototypes namely DA F,NoAck -DA F,NoAck ( Destination Authentication with no acknowledgment- Destination Authentication with no acknowledgment) and DA F,Ack -DA F,Ack ( Destination Authentication with acknowledgment- Destination Authentication with acknowledgment) have similar message exchange i.e. A sending message encrypted as BPubKey {} and B sending a message as APubKey {}, the only difference bieng with the fact that as latter is a prototype with acknowledgment, we have acknowledgments in the form or r A and r B ’s respectively . Eg. SKEME protocol ( DA F,NoAck -DA F,NoAck ) and ISO/IEC key transport mechanism 6, Needham-Schroeder public key protocol ( both for DA F,Ack -DA F,Ack )