密码学基础09-10 Authentication Basic protocol constructions Kerberos 復大辱软件学院 LiST
LiJT 1 密码学基础 09-10 Authentication – Basic protocol constructions – Kerberos
Outline of talk · Definitions Passwords Unix Passwords One time passwords Challenge-response techniques Basic protocol constructions Alsoone-time Authentication Involving TTP Needham-Schroeder Kerberos 復大辱软件学院 LiST
LiJT 2 Outline of Talk • Definitions • Passwords – Unix Passwords – One time passwords • Challenge-response techniques – Basic protocol constructions – Also “one-time” • Authentication Involving TTP – Needham-Schroeder – Kerberos
Definitions Authentication a claimant tries to show a verifier that the claimant is as declared Identification Entity Authentication 3 復大辱软件学院 LiST
LiJT 3 Definitions Authentication: • A claimant tries to show a verifier that the claimant is as declared – Identification –Entity Authentication
Definitions Claimant(a): The party that claims a certain identity [and provides evidence of possessing the identity] e.g. through possessing a specific secret Verifier( B): The party that verifies the identity of the claimant(accepts or rejects) e.g. through verifying the possession of the secret by claimant 復大辱软件学院 LiST
LiJT 4 Definitions • Claimant (A): The party that claims a certain identity [and provides evidence of possessing the identity] – e.g. through possessing a specific secret • Verifier (B): The party that verifies the identity of the claimant (accepts or rejects) – e.g. through verifying the possession of the secret by claimant
Definitions 单向 Unilatera| authentication 双向 Mutual authentication 5 復大辱软件学院 LiST
LiJT 5 Definitions • 单向 Unilateral authentication • 双向 Mutual authentication