1 authentication protocol
1.1 Password protocol
1.2 One-way authentication
Authentication process:
get serial number
decrypt [to]
verified to
verified to
On the implementation of Nonce:
Random number: Pseudo-random function, but there may actually be rules, and the protocol is not safe if the rules are cracked
Counters: Protocol incomplete (or attack) causing inconsistencies Random challenges received from third parties: How to get? Is the network robust/reliable?
Challenge/Response Protocol:
The authenticator sends a challenge (random number) <-----> The authenticated party sends an authentication block (including the challenge random number)
Password generator:
The login interface provides a random number
Enter the random number and PIN into the password generator to get
to login password
type login password
IFF Agreement (Identify Friend or Foe): Radar to War
The aircraft sends out a challenge, and the fighter must respond with a correct answer, otherwise it will
considered an enemy aircraft.