当前位置:高等教育资讯网  >  中国高校课件下载中心  >  大学文库  >  浏览文档

复旦大学:《密码学基础》课程教学资源(课件讲稿)09-10(1/2)Authentication - 身份认证

资源类别:文库,文档格式:PDF,文档页数:34,文件大小:1.17MB,团购合买
点击下载完整版文档(PDF)

密码学基础09-10 Authentication 身份认证 復大辱软件学院

1 密码学基础 09-10 Authentication -身份认证

内容间的联系 应用密码学基础 密码学 基本理论成熟 密码解决方案 应用相当广泛 PK、数字证书 身份认证、安全协议等 復大辱软件学院

2 内容间的联系 密码学 基本理论-成熟 应用密码学基础 密码解决方案 应用相当广泛 PKI、数字证书; 身份认证、安全协议等

Outline of talk · Definitions Passwords Unix Passwords One time passwords Challenge-response techniques 復大辱软件学院

3 Outline of Talk • Definitions • Passwords – Unix Passwords – One time passwords • Challenge-response techniques

Definitions Authentication a claimant tries to show a verifier that the claimant is as declared identification Different from message authentication which enables the recipient to verify that messages have not been tampered with in transit data integrity) and that they originate from the expected sender(authenticity) 復大辱软件学院

4 Definitions Authentication: • A claimant tries to show a verifier that the claimant is as declared – identification • Different from message authentication – which enables the recipient to verify that messages have not been tampered with in transit (data integrity) and that they originate from the expected sender (authenticity)

Definitions Authentication ·消息认证/报文的鉴别 身份认证 Message authentication has no timeliness Entity authentication happens in real time 双向和单向认证 復大辱软件学院

5 Definitions Authentication • 消息认证/报文的鉴别 • 身份认证 – Message authentication has no timeliness – Entity authentication happens in real time • 双向和单向认证

efa A good authentication scheme is ■■ Sound: an honest party can successfully authenticate him/herself Non-transferable No impersonation all this is true even when a large number of authentications are observed Eve is able to spoofleavesdrop Multiple instances are run simultaneously 復大辱软件学院

6 A good authentication scheme is… • Sound: an honest party can successfully authenticate him/herself • Non-transferable • No impersonation • All this is true even when – A large number of authentications are observed – Eve is able to spoof/eavesdrop – Multiple instances are run simultaneously

ot Basis of Authentication Something known- passwords PINS, keys Something possessed -cards handhelds Something inherent - biometrics 復大辱软件学院

7 Basis of Authentication • Something known - passwords, PINs, keys… • Something possessed - cards, handhelds… • Something inherent - biometrics

PINS and keys Long key on physical device(card), short Pin to remember Pin unlocks long key Need possession of both card and pIn Provides two-level security 復大辱软件学院

8 PINs and keys • Long key on physical device (card), short PIN to remember • PIN unlocks long key • Need possession of both card and PIN • Provides two-level security

Outline of talk Definitions · Passwords Unix Passwords One time passwords Challenge-response techniques 復大辱软件学院

9 Outline of Talk • Definitions • Passwords – Unix Passwords – One time passwords • Challenge-response techniques

ef Basic password authentication ° Setup User chooses password Hash of password stored in password file Authentication User logs into system, supplies password System computes hash compares to file 復大辱软件学院

10 Basic password authentication • Setup – User chooses password – Hash of password stored in password file • Authentication – User logs into system, supplies password – System computes hash, compares to file

点击下载完整版文档(PDF)VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
共34页,可试读12页,点击继续阅读 ↓↓
相关文档

关于我们|帮助中心|下载说明|相关软件|意见反馈|联系我们

Copyright © 2008-现在 cucdc.com 高等教育资讯网 版权所有