Lecture7 - Lecture 7 Authentication Authorization Systems...

Info icon This preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Lecture 7 Authentication / Authorization Systems and Kerberos CNT 5412 Network Security
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
2 Needham and Schroeder Paper 1978 Seminal paper on Cryptographic Protocols Identified several "canonical" protocols including for authentication Accidentally illustrated the first canonical protocol flaw found – The flaw was found two years later – The flaw reflects a very unlikely attack – Nonetheless, it illustrates how hard it is to produce reliable cryptographic protocols.
Image of page 2