At 11:13 AM -0600 1/19/2000, Rick Smith wrote:
>At 04:49 PM 01/18/2000 -0700, [EMAIL PROTECTED] wrote:
>>I've got something with around 100 bytes of ram and an 8-bit multiply.
>>Is there an authentication mechanism that can fit in this?
>
>What types of attacks are you concerned with? That's the main question. If
>you have a direct, unsniffable connection from the device to the person
>being authenticated, then just stick some secret data in there, and make
>the guy provide the secret. Be sure to give him/her a way to change the
>secret.
>
>If you're passing the authentication data across a sniffable connection,
>then I doubt you have the resources to do unsniffable authentication. That
>requires a reasonably strong crypto computation. You can throw some sand in
>attackers' eyes by doing challenge/response authentication with weak
>encryption, but a determined attacker should be able to recover the secret
>from intercepted challenge/response pairs.
>

You might consider the RC4 algorithm with a 64 byte state array. That 
leaves enough space for a 90 bit secret, stored as 15 six-bit bytes, 
a similar sized  or slightly smaller challenge vector, and a few 
bytes for indexing. The secret and challenge form the key, of course. 
After the key setup, I would generate and discard a large number of 
cypher bytes, say 512,  and use the next 15 cypher bytes as the 
response. The challenge array can be overwritten at this point.


Arnold Reinhold

Reply via email to