

{"id":217,"date":"2012-12-10T15:11:28","date_gmt":"2012-12-10T14:11:28","guid":{"rendered":"https:\/\/project.inria.fr\/quail\/?page_id=217"},"modified":"2013-01-15T16:46:08","modified_gmt":"2013-01-15T15:46:08","slug":"authentication-examples","status":"publish","type":"page","link":"https:\/\/project.inria.fr\/quail\/authentication-examples\/","title":{"rendered":"Authentication examples"},"content":{"rendered":"<p><div class=\"alert alert-success\" role=\"alert\"><p class=\"printonly\"><strong>Important!<\/strong><\/p> We propose several versions of this example for different size of secrets. Download: <a href=\"https:\/\/project.inria.fr\/quail\/files\/2013\/01\/authentication.zip\">authentication.zip<\/a><\/div><br \/>\nThese examples study a simple authentication protocol with a N bits password. The input is checked against the password; if the result is true the attacker can observe an output of 1; otherwise the output is 0. Here is the program for a 2 bits secret:<\/p>\n<p style=\"padding-left: 30px;\"><code>observable int1 o;<br \/>\npublic int2 input:=0;<br \/>\nsecret int2 password;<br \/>\nif (password==input)<br \/>\nthen assign o:=1;<br \/>\nelse assign o:=0;<br \/>\nfi<br \/>\nreturn;<br \/>\n<\/code><\/p>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>These examples study a simple authentication protocol with a N bits password. The input is checked against the password; if the result is true the attacker can observe an output of 1; otherwise the output is 0. Here is the program for a 2 bits secret: observable int1 o; public int2 input:=0; secret int2 password; &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/project.inria.fr\/quail\/authentication-examples\/\">Continue reading<\/a><\/p>\n","protected":false},"author":235,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-217","page","type-page","status-publish","hentry","nodate","item-wrap"],"_links":{"self":[{"href":"https:\/\/project.inria.fr\/quail\/wp-json\/wp\/v2\/pages\/217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/project.inria.fr\/quail\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/project.inria.fr\/quail\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/quail\/wp-json\/wp\/v2\/users\/235"}],"replies":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/quail\/wp-json\/wp\/v2\/comments?post=217"}],"version-history":[{"count":10,"href":"https:\/\/project.inria.fr\/quail\/wp-json\/wp\/v2\/pages\/217\/revisions"}],"predecessor-version":[{"id":361,"href":"https:\/\/project.inria.fr\/quail\/wp-json\/wp\/v2\/pages\/217\/revisions\/361"}],"wp:attachment":[{"href":"https:\/\/project.inria.fr\/quail\/wp-json\/wp\/v2\/media?parent=217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}