Home // SECURWARE 2015, The Ninth International Conference on Emerging Security Information, Systems and Technologies // View article
A Brief Survey of Nonces and Nonce Usage
Authors:
Geir Køien
Keywords: Number-used-once; Nonce; Randomness; Freshness; Timeliness; Uniqueness; Non-repeatability; Cryptographic protocol.
Abstract:
Last year the European Union Agency for Network and Information Security (ENISA) published a report on cryptographic protocols. A main verdict was that we still have not reached maturity for the design and analysis of cryptographic protocols. This is bad news for a society that has become dependent on well-functioning information- and communication technology (ICT) infrastructures. In this paper, we address this by investigating the emph{nonce}. The nonce, a number-used-once, is but one small element of a cryptographic protocol. That is, a small, but nevertheless a critically important element. Yet, there is relatively little to be found in the literature regarding the properties of the nonce. This is thus an attempt to improve on this, by providing an initial analysis of nonces and classifying types of nonces used in different cryptographical protocols.
Pages: 85 to 91
Copyright: Copyright (c) IARIA, 2015
Publication date: August 23, 2015
Published in: conference
ISSN: 2162-2116
ISBN: 978-1-61208-427-5
Location: Venice, Italy
Dates: from August 23, 2015 to August 28, 2015