null
US
Iniciar Sesión
Regístrate Gratis
Registro
Hemos detectado que no tienes habilitado Javascript en tu navegador. La naturaleza dinámica de nuestro sitio requiere que Javascript esté habilitado para un funcionamiento adecuado. Por favor lee nuestros
términos y condiciones
para más información.
Siguiente
Copiar y Editar
¡Debes iniciar sesión para completar esta acción!
Regístrate gratis
54836
Crypto U8 (part 3), entity authentication
Descripción
(Unit 8 - randomness, freshness, AKE) IYM002 Mapa Mental sobre Crypto U8 (part 3), entity authentication, creado por jjanesko el 23/04/2013.
Sin etiquetas
iym002
unit 8 - randomness
freshness
ake
iym002
unit 8 - randomness, freshness, ake
Mapa Mental por
jjanesko
, actualizado hace más de 1 año
Más
Menos
Creado por
jjanesko
hace más de 11 años
99
10
0
Resumen del Recurso
Crypto U8 (part 3), entity authentication
assurance that an expected entity is involved and currently part of a communication session
need
identity assurance
freshness
2 kinds
mututal
both entities provide each other with assurance
unilateral
authentication of one entitiy to another
ex. ATM
can only be provided at one moment in time
used in 2 types of situatios
access control
part of more complex crypto processes
one approach to entity authentication: zero knowledge mechanisms??
wikipedia's article very clear!! :)
Nota:
http://en.wikipedia.org/wiki/Zero-knowledge_proof#Abstract_example
useful when parties don't trust each other
With other authentication methods, some information about a key is leaked every time a transaction takes place.
2 entities
prover
verifier
expensive to use
information used to provide assurance of identity
what user has
dumb token
ex. card with mag stripe
smart token
sometimes have built in user interfaces
have memory, processor, better storage of crypto info
ex. smartcard
usually used in combination with some other form of identity assurance like a pin
needs some form of reader
something the user is
biometrics
static
measures fixed characteristic like fingerprints
dynamic
measures characteristics that change slightly like voice
measurements of biometric info are digitalized stored for use
something the user knows
passwords, pins, passphrases
most common
problems
length
low complexity
repeated across systems
social engineering
password database attacks
shoulder surfing
should be crypto protected at all times
example of Unix password DB
when user attempts login, system pulls user hash from DB & applies to special DES implementation
covert password to 56 bit DES key and encrypt plaintext of all 0s 25 times
check to see if resulting value equals value stored in DB for password
dynamic passwords
Adjunto:
Crypto U8, example dynamic password scheme
one time password schemes
2 parts
password function
implemented on a smart token
this results in 2 factor authentication
input
must be fresh (uses freshness mechanism)
analysis
every time new auth challenge issued
local use of pin
2 factor authentication
advantages
limits exposure
not repeatable
Mostrar resumen completo
Ocultar resumen completo
¿Quieres crear tus propios
Mapas Mentales
gratis
con GoConqr?
Más información
.
Similar
Crypto U8, example dynamic password scheme
jjanesko
Crypto U8 (part 2), Freshness
jjanesko
Crypto U8 (part 1), Randomness
jjanesko
Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
jjanesko
Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
jjanesko
Crypto U3, Theoretical vs. Practical Security
jjanesko
Crypto U1, Basic Principles
jjanesko
Crypto U4, Stream Cipher
jjanesko
Crypto U4, Block Cipher, Counter Mode
jjanesko
Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
jjanesko
Crypto U2, Crypto design principles
jjanesko
Explorar la Librería