作者: Yuji Nagai , Toshihiro Suzuki , Taku Kato , Tatsuyuki Matsushita , Noboru Shibata
DOI:
关键词: Data Authentication Algorithm 、 Challenge–response authentication 、 Multi-factor authentication 、 Computer science 、 Challenge-Handshake Authentication Protocol 、 Key (cryptography) 、 Computer security 、 Authentication protocol 、 Session key 、 Authentication
摘要: According to one embodiment, an authentication method includes generating, by the memory, first information calculating secret identification with a memory session key in one-way function operation, transmitting encrypted information, family block, and host, second generated decrypting host operation. The further comparing, information.