Deniable authentication

From CryptoDox, The Online Encyclopedia on Cryptography and Information Security

Jump to: navigation, search

In cryptography, deniable authentication refers to authentication between a set of participants where the participants themselves can be confident in the authenticity of the messages, but it cannot be proved to a third party after the event.

In practice, deniable authentication can be achieved through the use of message authentication codes (MACs) by making sure that if an attacker is able to decrypt the messages, they would also know the MAC key as part of the protocol, and would thus be able to forge authentic-looking messages. For example, in the Off-the-Record Messaging (OTR) protocol, MAC keys are derived from the asymmetric decryption key through a cryptographic hash function. In addition to that, the OTR protocol also reveals used MAC keys as part of the next message, when they have already been used to previously received messages and will not be re-used.[1]

See also


  1. Nikita Borisov, Ian Goldberg, Eric Brewer, Workshop on Privacy in the Electronic Society, Off-the-Record Communication, or, Why Not To Use PGP

CryptoDox This article is a part of CryptoDox, an attempt to build an Online Encyclopedia on Cryptography and Information Security. You are seeing this box on this page since we believe this is a stub page. Create an account for yourself on this website and start contributing content.