A note on the use of timestamps as nonces
- 1 April 1993
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGOPS Operating Systems Review
- Vol. 27 (2), 10-14
- https://doi.org/10.1145/155848.155852
Abstract
E is reducing the number of messages neededfor authentication. The use of timestamps in Kerberosallowed the elimination one message from theprotocol, and two if mutual authentication was notrequired. This is important when round trip latencyis an issue. The use of a timestamp as a nonce alsoallows one-way authentication when communicationwith the server is in one direction only.Authors" address: University of Southern California, InformationSciences Institute, 4676 Admiralty Way,...Keywords
This publication has 6 references indexed in Scilit:
- Logics for cryptographic protocols-virtues and limitationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A nonce-based protocol for multiple authenticationsACM SIGOPS Operating Systems Review, 1992
- A security risk of depending on synchronized clocksACM SIGOPS Operating Systems Review, 1992
- Reasoning about belief in cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978