csce201-lect3.a

csce201-lect3.a - CSCE201 CSCE201 Identificationand...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
CSCE 201 CSCE 201 Identification and  Identification and  Authentication  Authentication  Microsoft support Microsoft support Fall 2010
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSCE 201 - Farkas 2 One-time Password One-time Password Use the password exactly once!
Background image of page 2
CSCE 201 - Farkas 3 Time Synchronized Time Synchronized There is a hand-held authenticator It contains an internal clock, a secret key, and a display Display outputs a function of the current time and the key It changes about once per minute User supplies the user id and the display value Host uses the secret key, the function and its clock to calculate the expected output Login is valid if the values match
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSCE 201 - Farkas 4 Time Synchronized Time Synchronized Secret key Time One Time Password Encryption
Background image of page 4
CSCE 201 - Farkas 5 Challenge Response Challenge Response Work station Host Network Non-repeating challenges from the host is used The device requires a keypad User ID Challenge Response
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSCE 201 - Farkas 6 Challenge Response Challenge Response Secret key Challenge One Time Password Encryption
Background image of page 6
CSCE 201 - Farkas 7 Devices with Personal Devices with Personal Identification Number (PIN) Identification Number (PIN) Devices are subject to theft, some devices require PIN (something the user knows) PIN is used by the device to authenticate the user Problems with challenge/response schemes Key database is extremely sensitive This can be avoided if public key algorithms are used
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSCE 201 - Farkas 8 Smart Cards Smart Cards Portable devices with a CPU, I/O ports, and
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/13/2011 for the course CSCE 201 taught by Professor Staff during the Fall '10 term at South Carolina.

Page1 / 21

csce201-lect3.a - CSCE201 CSCE201 Identificationand...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online