Security in Computing (3rd Edition)

Info icon This preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
1 October 14, 2005 © Doug Tygar, 2005 (cs161.org) CS 194-1 (CS 161) Authentication Doug Tygar ([email protected]) October 14, 2005 cs161.org October 14, 2005 © Doug Tygar, 2005 (cs161.org) Authentication Alice and Bob love each other, but they live far apart We’ve learned how they can encrypt their messages How can they make sure they are talking to each other? This is the question of authentication October 14, 2005 © Doug Tygar, 2005 (cs161.org) Types of authentication End user End user (Alice & Bob) End user Local computer (login) End user Remote computer (web site login) Computer Computer (DRM) Local computer End user (fake ATM check) Remote computer End user (phishing check ) October 14, 2005 © Doug Tygar, 2005 (cs161.org) More types of authentication Things become even more complicated when we consider software authenticating This area is still under active development (we may talk about it at the end of class) “Trusted computing” October 14, 2005 © Doug Tygar, 2005 (cs161.org) Authentication is complicated It is surprisingly hard to authentication right Most first, second, & third attempts get it wrong I’ve taught semester length Ph.D. level courses on authentication and we still didn’t cover everything This lecture will talk about the basics October 14, 2005 © Doug Tygar, 2005 (cs161.org) Passwords Passwords are a classic way to authenticate (PIN numbers are a type of password) Advantages of passwords: Seemingly they work everywhere Easy to remember and use Everyone knows how to use them
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
2 October 14, 2005 © Doug Tygar, 2005 (cs161.org)
Image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern