In cryptography, deniable authentication refers to message authentication between a set of participants where the participants themselves can be confident in the authenticity of the messages, but it cannot be proved to a third party after the event.[1][2][3]
In practice, deniable authentication between two parties can be achieved through the use of message authentication codes (MACs) by making sure that if an attacker is able to decrypt the messages, they would also know the MAC key as part of the protocol, and would thus be able to forge authentic-looking messages.[4] For example, in the Off-the-Record Messaging (OTR) protocol, MAC keys are derived from the asymmetric decryption key through a cryptographic hash function. In addition to that, the OTR protocol also reveals used MAC keys as part of the next message, after they have already been used to authenticate previously received messages, and will not be re-used.[5]
^Wei-Bin Lee; Chia-Chun Wu; Woei-Jiunn Tsaur (17 April 2006). "A novel deniable authentication protocol using generalized ElGamal signature scheme" (PDF). Information Sciences. 177 (6): 1376–1381. doi:10.1016/j.ins.2006.09.020. Retrieved 21 January 2015.
^Mario Di Raimondo; Rosario Gennaro (28 May 2009). "New Approaches for Deniable Authentication". Journal of Cryptology. 22 (4): 572–615. CiteSeerX 10.1.1.59.1917. doi:10.1007/s00145-009-9044-3. S2CID 211210. (Download 2005 preprint version)
^Jayaprakash Kar; Banshidhar Majhi (11 June 2010). "A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm". Preprint.
^Nikita Borisov; Ian Goldberg; Eric Brewer (2004-10-28). Off-the-Record Communication, or, Why Not To Use PGP(PDF). Workshop on Privacy in the Electronic Society 2004. Retrieved 2007-02-01.
and 24 Related for: Deniable authentication information
In cryptography, deniableauthentication refers to message authentication between a set of participants where the participants themselves can be confident...
Messaging, offer deniableauthentication which gives the participants plausible deniability of their conversations. While deniableauthentication is not technically...
Off-the-Record Messaging enabling for encrypted conversations with deniableauthentication and perfect forward secrecy. Antispam by asking a simple question...
messages. It used end-to-end encryption with forward secrecy and deniableauthentication to secure all instant messages to other TextSecure users. TextSecure...
more prone to watermarking attacks than others. Pre-boot authentication: Whether authentication can be required before booting the computer, thus allowing...
"Plausible Deniability". FreeOTFE. Archived from the original on 24 January 2013. TrueCrypt FAQ - see question I use pre-boot authentication. Can I prevent...
aspects: Key agreement or establishment Entity authentication Symmetric encryption and message authentication material construction Secured application-level...
and its applications are defensive in nature, and provide privacy, authentication, and security to users. Cryptovirology employs a twist on cryptography...
a partition or (in Windows) the entire storage device with pre-boot authentication. VeraCrypt is a fork of the discontinued TrueCrypt project. It was initially...
(ECDH) with Curve25519, for message authentication codes (MAC, authentication) Keyed-hash message authentication code (HMAC) based on SHA-256, for symmetric...
Whitfield; van Oorschot, Paul C.; Wiener, Michael J. (June 1992). "Authentication and Authenticated Key Exchanges" (PDF). Designs, Codes and Cryptography. 2 (2):...
any number of "hidden volumes" to be created, giving plausible deniability and deniable encryption, and also has the option of encrypting full partitions...
keystream. Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key can be used to authenticate the hash value...
working on commercial encryption software. TrueCrypt VeraCrypt Plausible Deniability The authors of Scramdisk and E4M exchanged some code – the author of...
pre-boot authentication passwords by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)"...
steganography is plausible deniability, that is, unless one can prove the data is there (which is usually not easy), it is deniable that the file contains...
March 2016. Retrieved 28 November 2018. Young, Adam; Yung, Moti (1997). "Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage"...
public or private proxy and computer forensics, encryption and plausible deniability, etc. In terms of cybercrime, we may often associate it with various...
of the innocent "random" image noise in digital photos. To support such deniable encryption systems, a few cryptographic algorithms are specifically designed...
as the antagonist. It is in the second shift that, through plausible deniability, Marta's innocence is unequivocal. This posed a significant writing challenge...
remained classified or heavily redacted, thus "allow[ing] for plausible deniability." It is generally accepted that Egypt, in some capacity, was involved...