中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)Introduction(主讲:曹天杰)

Authentication protocols 曹天杰 Cao tianjie ticao@cumt.edu.cn 中科院软件所信息安全国家重点实验室 2003.4.21
1 Authentication Protocols 曹天杰 Cao Tianjie tjcao@cumt.edu.cn 中科院软件所信息安全国家重点实验室 2003.4.21

Introduction Cryptographic protocol Distributed algorithm Based on cryptographic building blocks To achieve a security related goal Examples Entity Authentication Key establishment: Key Distribution(Key enveloping Key transport), Key agreement Electronic Payment
2 Introduction • Cryptographic protocol – Distributed algorithm – Based on cryptographic building blocks – To achieve a security related goal • Examples: – Entity Authentication – Key Establishment:Key Distribution(Key enveloping, Key transport), Key agreement – Electronic Payment – …

authentication Hi! Im Alice Alice Bob insecure channel Eve (Eve owns the channel!) How does bob know that alice is alice, not eve?
3 authentication Alice Bob How does Bob know that Alice is Alice, not Eve? insecure channel Eve (Eve owns the channel!) Hi! I’m Alice

authentication Authentication is a means by which identity is established It allows one party to gain assurances about the identity of another party in a protocol, and that the second has actively participated The goal of authentication is to achieve all this over an insecure channel with an active attacker and no shared secrets exchange to avoid session hijacking(afterey Note: authentication must be combined with ke authentication)
4 authentication • Authentication is a means by which identity is established. • It allows one party to gain assurances about the identity of another party in a protocol, and that the second has actively participated. • The goal of authentication is to achieve all this over an insecure channel with an active attacker and no shared secrets. • Note: authentication must be combined with key exchange to avoid session hijacking (after authentication)

objectives of identification protocols If Alice and Bob are both honest, a is able to successfully authenticate herself to Bob, i.e. Bob will complete the protocol having accepted Alice's identity. Bob cannot reuse an identification exchange with Alice so as to impersonate her in conversations with others The probability that Eve can successfully impersonate Alice to Bob is negligible(e. g. computationally difficult) All the above remain true even if Eve has seen many previous authentication sessions between Alice and Bob, has had experience in authenticating herself with both, and multiple authentication sessions are run simultaneously
5 objectives of identification protocols • If Alice and Bob are both honest, A is able to successfully authenticate herself to Bob, i.e. Bob will complete the protocol having accepted Alice’s identity. • Bob cannot reuse an identification exchange with Alice so as to impersonate her in conversations with others. • The probability that Eve can successfully impersonate Alice to Bob is negligible (e.g. computationally difficult). • All the above remain true even if Eve has seen many previous authentication sessions between Alice and Bob, has had experience in authenticating herself with both, and multiple authentication sessions are run simultaneously

basis of identification · Something you know Passwords, PINs, secret keys, your mother's maiden name Something you have Magnetic cards smart cards, physical keys handheld password generators · Something you are biometrics(DNA, signatures fingerprints voice, retinal patterns, hand geometries typing dialect/profiling)
6 basis of identification • Something you know – Passwords, PINs, secret keys, your mother’s maiden name • Something you have – Magnetic cards, smart cards, physical keys, handheld password generators. • Something you are – biometrics (DNA, signatures, fingerprints, voice, retinal patterns, hand geometries, typing dialect/profiling)

basis of identification Biometrics have major problems in real world situations How do you revoke keys? Biology is messy We leave dna, fingerprints everywhere just ask OJ How do you give a mugger your fingerprint? How do you authenticate if he's just hit ? you in the eye
7 basis of identification – Biometrics have major problems in real world situations • How do you revoke keys? • Biology is messy –We leave DNA, fingerprints everywhere - just ask OJ • How do you give a mugger your fingerprint? • How do you authenticate if he’s just hit you in the eye?

attacks on authentication Impersonation Replay · Interleaving impersonation involving selective combination of information from one or more previous or simultaneous sessions Reflection an interleaving attack involving sending information from an ongoing authentication session back to the originator
8 attacks on authentication • Impersonation • Replay • Interleaving – impersonation involving selective combination of information from one or more previous or simultaneous sessions • Reflection – an interleaving attack involving sending information from an ongoing authentication session back to the originator

attacks on authentication Forced delay adversary intercepts a message and relays it at some later point in time(note: not the same as replay) Chosen-text attack on challenge-response where an adversary chooses challenges in an attempt to extract the secret key
9 attacks on authentication • Forced delay – adversary intercepts a message and relays it at some later point in time (note: not the same as replay) • Chosen-text – attack on challenge-response where an adversary chooses challenges in an attempt to extract the secret key

Simple authentication: 1 st Attempt Alice Alice.k③象 Bob 分=K AB Eve
10 Eve Simple Authentication: 1st Attempt Alice Bob Alice, KAB = KAB
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 《软件工程》课程学习资料:软件工程思想(林锐).pdf
- 《C++语言基础教程》课程电子教案(PPT教学课件)第6章 类和对象(二).ppt
- 《C++语言基础教程》课程电子教案(PPT教学课件)第5章 类和对象(一).ppt
- 《C++语言基础教程》课程电子教案(PPT教学课件)第4章 函数和作用域.ppt
- 《C++语言基础教程》课程电子教案(PPT教学课件)第3章 语句.ppt
- 《C++语言基础教程》课程电子教案(PPT教学课件)第2章 数据类型和表达式.ppt
- 《C++语言基础教程》课程电子教案(PPT教学课件)第1章 C++语言概述.ppt
- 《C++语言基础教程》课程电子教案(PPT教学课件)第9章 C++的I/O流类库.ppt
- 《C++语言基础教程》课程电子教案(PPT教学课件)第8章 多态性和虚函数.ppt
- 《C++语言基础教程》课程电子教案(PPT教学课件)第7章 继承性和派生类.ppt
- 湖南工程学院:《中文版AutoCAD 2004基础教程》课程教学资源(PPT课件讲稿)第一章 绘图基础知识(刘军安).ppt
- 湖南工程学院:《中文版AutoCAD 2004基础教程》课程教学资源(PPT课件讲稿)第五章 线型、颜色及图层.ppt
- 湖南工程学院:《中文版AutoCAD 2004基础教程》课程教学资源(PPT课件讲稿)第八章 标注文字.ppt
- 湖南工程学院:《中文版AutoCAD 2004基础教程》课程教学资源(PPT课件讲稿)第十章 使用块、外部参照和设计中心.ppt
- 湖南工程学院:《中文版AutoCAD 2004基础教程》课程教学资源(PPT课件讲稿)第十一章 绘制基本三维对象.ppt
- 湖南工程学院:《中文版AutoCAD 2004基础教程》课程教学资源(PPT课件讲稿)第三章 编辑图形对象.ppt
- 湖南工程学院:《中文版AutoCAD 2004基础教程》课程教学资源(PPT课件讲稿)第七章 控制图形显示.ppt
- 湖南工程学院:《中文版AutoCAD 2004基础教程》课程教学资源(PPT课件讲稿)第六章 绘制面域与图案填充.ppt
- 湖南工程学院:《中文版AutoCAD 2004基础教程》课程教学资源(PPT课件讲稿)第九章 标注图形尺寸.ppt
- 湖南工程学院:《中文版AutoCAD 2004基础教程》课程教学资源(PPT课件讲稿)第二章 绘制二维图形对象.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)Block ciphers-AES.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)Block ciphers-DES.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)Block ciphers-L&D.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)CRYPTO12.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)Digital Signature.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)HashFunctions.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)Lecture 3 Number Theory Basics I.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)NTHEORY 2 Group Theory and Number.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)Attacks, Services, and Mechanisms.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)overview.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)Public Key Cryptography1.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)Public Key Cryptography2.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)security protocols.ppt
- 《操作系统原理》课程教学资源(PPT课件讲稿)前言.ppt
- 《操作系统原理》课程教学资源(PPT课件讲稿)第1章 操作系统概论.ppt
- 《操作系统原理》课程教学资源(PPT课件讲稿)第2章 Linux概述.ppt
- 《操作系统原理》课程教学资源(PPT课件讲稿)Linux程序设计简介.ppt
- 《操作系统原理》课程教学资源(PPT课件讲稿)(英文版)Linux Development Environment.ppt
- 《操作系统原理》课程教学资源(PPT课件讲稿)Linux核心体系结构简介.ppt
- 《操作系统原理》课程教学资源(PPT课件讲稿)第3章 进程管理.ppt