Common use of Mutual authentication and key agreement Clause in Contracts

Mutual authentication and key agreement. In steps 3 and 4, by using the secure one-way hash function H( ) [16], the reader and the tag always verify whether the received massage authentication values (H(▇▇▇, kAj B, SK) and H(IDB, kAB, SK)) are legal corresponding party’s sending message. There- fore, the proposed AKA protocol provides the two-way mutual authentica- tion and guarantees the secrecy of the reader and the tag.

Appears in 1 contract

Sources: Authentication and Key Agreement Protocol

Mutual authentication and key agreement. In steps 3 and 4, by using the secure one-way hash function H( ) [16], the reader and the tag always verify whether the received massage authentication values (H(▇▇▇, kAj BkA′ B , SK) and H(IDB, kAB, SK)) are legal corresponding party’s sending message. There- fore, the proposed AKA protocol provides the two-way mutual authentica- tion and guarantees the secrecy of the reader and the tag.

Appears in 1 contract

Sources: Authentication and Key Agreement Protocol