At 11:13 AM -0600 1/19/2000, Rick Smith wrote:
>At 04:49 PM 01/18/2000 -0700, [EMAIL PROTECTED] wrote:
>>I've got something with around 100 bytes of ram and an 8-bit multiply.
>>Is there an authentication mechanism that can fit in this?
>
>What types of attacks are you concerned with? That's the main question. If
>you have a direct, unsniffable connection from the device to the person
>being authenticated, then just stick some secret data in there, and make
>the guy provide the secret. Be sure to give him/her a way to change the
>secret.
>
>If you're passing the authentication data across a sniffable connection,
>then I doubt you have the resources to do unsniffable authentication. That
>requires a reasonably strong crypto computation. You can throw some sand in
>attackers' eyes by doing challenge/response authentication with weak
>encryption, but a determined attacker should be able to recover the secret
>from intercepted challenge/response pairs.
>
You might consider the RC4 algorithm with a 64 byte state array. That
leaves enough space for a 90 bit secret, stored as 15 six-bit bytes,
a similar sized or slightly smaller challenge vector, and a few
bytes for indexing. The secret and challenge form the key, of course.
After the key setup, I would generate and discard a large number of
cypher bytes, say 512, and use the next 15 cypher bytes as the
response. The challenge array can be overwritten at this point.
Arnold Reinhold