Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
S/KEY
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Password generation== The ''server'' is the computer that will perform the authentication. [[File:Skey password generation.svg|thumb|280px|S/KEY password generation]] # This step begins with a secret key ''W''. This secret can either be provided by the user, or can be generated by a computer. Either way, if this secret is disclosed, then the security of S/KEY is compromised. # A [[cryptographic hash function]] ''H'' is applied ''n'' times to ''W'', thereby producing a [[hash chain]] of ''n'' one-time passwords. The passwords are the results of the application of the cryptographic hash function: #:''H''(''W''), ''H''(''H''(''W'')), ..., ''H''<sup>''n''</sup>(''W''). # The initial secret ''W'' is discarded. # The user is provided with the ''n'' passwords, printed out in reverse order: #:''H''<sup>''n''</sup>(''W''), ''H''<sup>''n''β1</sup>(''W''), ..., ''H''(''H''(''W'')), ''H''(''W''). # The passwords ''H''(''W''), ''H''(''H''(''W'')), ..., ''H''<sup>''n''β1</sup>(''W'') are discarded from the server. Only the password ''H''<sup>''n''</sup>(''W''), the one at the top of the user's list, is stored on the server.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)