LectureNote20-IdentAuth

LectureNote20-IdentAuth - I DENTIFICATION AND A...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: I DENTIFICATION AND A UTHENTICATION I DENTIFICATION AND A UTHENTICATION P ASSWORD B ASED A UTHENTICATION O NE T IME P ASSWORDS K ERBEROS O THER M UTUAL A UTHENTICATION P ROTOCOLS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University 1 / 98 Entity Authentication I DENTIFICATION AND A UTHENTICATION P ASSWORD B ASED A UTHENTICATION O NE T IME P ASSWORDS K ERBEROS O THER M UTUAL A UTHENTICATION P ROTOCOLS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University 2 / 98 Allows one party the verifier to gain assurance that the identity of another the claimant is as declared Prevents impersonation Typically, the claimant reveals knowledge of some secret S to the verifier Strong Authentication The claimant reveals knowledge of S to the verifier without revealing S to the verifier. Message Authentication I DENTIFICATION AND A UTHENTICATION P ASSWORD B ASED A UTHENTICATION O NE T IME P ASSWORDS K ERBEROS O THER M UTUAL A UTHENTICATION P ROTOCOLS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University 3 / 98 Data origin authentication Provided by digital signatures Provides no timeliness guarantee with respect to when message was created Authenticated key establishment is essentially message authentication where the message is the key Entity Authentication Goals I DENTIFICATION AND A UTHENTICATION P ASSWORD B ASED A UTHENTICATION O NE T IME P ASSWORDS K ERBEROS O THER M UTUAL A UTHENTICATION P ROTOCOLS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University 4 / 98 Completion with acceptance or Termination with rejection In case of honest parties A and B, B will complete protocol having accepted As identity Transferability B cannot reuse an identification...
View Full Document

Page1 / 16

LectureNote20-IdentAuth - I DENTIFICATION AND A...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online