Cryptographic nonce
From Wikipedia, the free encyclopedia
In security engineering, a nonce is a number used once. It is often a random or pseudo-random number issued in an authentication protocol to ensure that old communications cannot be reused in replay attacks. For instance, nonces are used in HTTP digest access authentication to calculate an MD5 digest of the password. The nonces are different each time that the 401 authentication challenge response code is presented, and each client request has a unique sequence number, thus making the replay attack virtually impossible.
Some also refer to initialization vectors as nonces for the above reasons. To ensure that a nonce is used only once, it should be time-variant (including a suitably granular timestamp in its value), or generated with enough random bits to ensure a probabilistically insignificant chance of repeating a previously generated value.
[edit] See also
[edit] External links
- Sam Ruby Blogging on Nonce with an implementation
- HTTP Authentication: Basic and Digest Access Authentication
- Robust Explicit Congestion Notification (ECN) Signaling with Nonces
- UMAC: Message Authentication Code using Universal Hashing