cse443-lecture-8-appliedcryptography

cse443-lecture-8-appliedcryptography - Lecture 8 - Applied...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
CMPSC 443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger Lecture 8 - Applied Cryptography CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CMPSC 443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger Page Cryptographic Protocols • Secure distributed applications have some cryptographic protocols that defne the constructions and procedures For communicating between two parties – E.g., SSL/TLS, IPsec, SSH, Kerberos – Each has a set oF goals (e.g., confdentiality, integrity, authenticity, non-repudiation) – Defned For some set oF assumed principals, trust, . .. – Much oF network security is Focused on the design and application oF these protocols • Again, lets start with Alice and Bob 2
Background image of page 2
CMPSC 443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger Page Basic (User) Authentication Alice Bob • Bob wants to authenticate Alice ʼ s identity – (is who she says she is) [pw A ] 1 [Y/N] 2 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CMPSC 443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger Page Hash User Authentication Alice Bob • Bob wants to authenticate Alice ʼ s identity – (is who she says she is) [h(pw A )] 1 [Y/N] 2 4
Background image of page 4
CMPSC 443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger Page Challenge/Response User Authentication Alice Bob • Bob wants to authenticate Alice ʼ s identity – AKA, digest authentication [h(c+pw A )] 2 1 [c] [Y/N] 3 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CMPSC 443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger Page User authentication vs. data security • User authentication proves a property about the communicating parties – E.g., I know a password • Data authentication ensures properties about the transmitted data – E.g., guarantees confdentiality oF the data • Now, lets talk about the latter, data security 6
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 18

cse443-lecture-8-appliedcryptography - Lecture 8 - Applied...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online