复旦大学:《密码学基础》课程教学资源(课件讲稿)09-10(2/2)Authentication – Basic protocol constructions – Kerberos

密码学基础09-10 Authentication Basic protocol constructions Kerberos 復大辱软件学院 LiST
LiJT 1 密码学基础 09-10 Authentication – Basic protocol constructions – Kerberos

Outline of talk · Definitions Passwords Unix Passwords One time passwords Challenge-response techniques Basic protocol constructions Alsoone-time Authentication Involving TTP Needham-Schroeder Kerberos 復大辱软件学院 LiST
LiJT 2 Outline of Talk • Definitions • Passwords – Unix Passwords – One time passwords • Challenge-response techniques – Basic protocol constructions – Also “one-time” • Authentication Involving TTP – Needham-Schroeder – Kerberos

Definitions Authentication a claimant tries to show a verifier that the claimant is as declared Identification Entity Authentication 3 復大辱软件学院 LiST
LiJT 3 Definitions Authentication: • A claimant tries to show a verifier that the claimant is as declared – Identification –Entity Authentication

Definitions Claimant(a): The party that claims a certain identity [and provides evidence of possessing the identity] e.g. through possessing a specific secret Verifier( B): The party that verifies the identity of the claimant(accepts or rejects) e.g. through verifying the possession of the secret by claimant 復大辱软件学院 LiST
LiJT 4 Definitions • Claimant (A): The party that claims a certain identity [and provides evidence of possessing the identity] – e.g. through possessing a specific secret • Verifier (B): The party that verifies the identity of the claimant (accepts or rejects) – e.g. through verifying the possession of the secret by claimant

Definitions 单向 Unilatera| authentication 双向 Mutual authentication 5 復大辱软件学院 LiST
LiJT 5 Definitions • 单向 Unilateral authentication • 双向 Mutual authentication

Definitions Data-Origin authentication message authentication Data Integrity Entity Authentication 復大辱软件学院 LiST
LiJT 6 Definitions • Data-Origin Authentication – message authentication • Data Integrity • Entity Authentication

Definitions Data-Origin Authentication Data Integ Early textbooks, viewed these two notions with no essential difference However, two very different notions Auth necessarily involves communications involves identifying the source of a message the most significantly, freshness of a message liveness of the message source message is fresh or not should be determined by apps 復大辱软件学院 LiST
LiJT 7 Definitions • Data-Origin Authentication • Data Integrity – Early textbooks, viewed these two notions with no essential difference – However, two very different notions • Auth. necessarily involves communications • involves identifying the source of a message • the most significantly, freshness of a message; liveness of the message source. – message is fresh or not should be determined by apps

Definitions Data Integrity Entity Authentication Often, a claimed identity in a protocol is a message in its own right. So, confidence about a claimed identity and about the liveness of the claimant can be established by applying data-origin authentication mechanisms 8 復大辱软件学院 LiST
LiJT 8 Definitions • Data Integrity • Entity Authentication – Often, a claimed identity in a protocol is a message in its own right. So, confidence about a claimed identity and about the liveness of the claimant can be established by applying data-origin authentication mechanisms

Authentication scheme · Weak authentication Passwords. pin. etc One-time passwords(semi-strong authentication) Strong(cryptographic)authentication Challenge- Response Mechanisms Zero-knowledge authentication Allow Claimant to demonstrate knowledge of a secret without revealing any information whatsoever of the secret 復大辱软件学院 LiST
LiJT 9 Authentication scheme • Weak authentication – Passwords, PIN, etc – One-time passwords(semi-strong authentication) • Strong (cryptographic) authentication – Challenge – Response Mechanisms • Zero-knowledge authentication – Allow Claimant to demonstrate knowledge of a secret without revealing any information whatsoever of the secret

Outline of talk Definitions Passwords Unix Passwords One time passwords Challenge-response techniques Basic protocol constructions Alsoone-time Authentication Involving TTP 復大辱软件学院 LiST
LiJT 10 Outline of Talk • Definitions • Passwords – Unix Passwords – One time passwords • Challenge-response techniques – Basic protocol constructions – Also “one-time” • Authentication Involving TTP
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)09-10(1/2)Authentication - 身份认证.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)07-08 PKI(Public Key Infrastructure)公钥基础设施——公钥技术的应用.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)06 Stream Cipher.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)05 Message authentication and Hash function.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)04 Public Key Cryptography, RSA.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)03 Modern Block Ciphers.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)02 Introduction to Cryptography -Classical Encryption Techniques(cont.).pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)01 Classical Encryption Techniques.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_14 - Synchronization.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_13- Collective behaviors+Drone flocking.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_12- Community+Opinion dynamics+consensus.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_11- Spreading on networks.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_10- Evolutionary game.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_9- TimeseriesNetworks and ECG.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_8- Modelling networks_image.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_7- Robustness and fragile.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_6- Scale free networks.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_5- NW+Searching+Pagerank.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_4- Small world model.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_3- Erdos Ranyi random graphs.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)11.1 IP Security.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)11.2 Web & EC Security.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)12 Block Chain 区块链 - 密码解决方案集大成者.pdf
- 河南中医药大学:《数据库规划与设计》课程教学资源(Oracle实验指导)实验7 创建及管理Oracle数据表.pdf
- 天津大学:基因序列的比对、挖掘和功能分析(邹权).ppt
- 东南大学:《计算机视觉基础》课程教学资源(课程介绍).pdf
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第10讲 计算机辅助翻译的具体工作流程.ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第11讲 翻译项目的管理.ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第12讲(实践课3).ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第13讲(讨论课1).ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第14讲 基于CAT翻译记忆库的翻译研究.ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第15讲(讨论课2).ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第16讲 计算机辅助翻译技术的发展前景.ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第17讲 本地化与翻译的发展和革新.ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第18讲(讨论课3).ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第1讲《计算机辅助翻译》课程内容与发展历史.ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第2讲 计算机辅助翻译的主要形式.ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第3讲 CAT的核心技术——翻译记忆库介绍.ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第4讲 语言资源模板字段和设置.ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第5讲 翻译记忆库的维护、Winalign的使用与翻译文件批量导入.ppt