Crypto U8 (part 3), entity authentication

Descripción

(Unit 8 - randomness, freshness, AKE) IYM002 Mapa Mental sobre Crypto U8 (part 3), entity authentication, creado por jjanesko el 23/04/2013.
jjanesko
Mapa Mental por jjanesko, actualizado hace más de 1 año
jjanesko
Creado por jjanesko hace alrededor de 11 años
98
10

Resumen del Recurso

Crypto U8 (part 3), entity authentication
  1. assurance that an expected entity is involved and currently part of a communication session
    1. need
      1. identity assurance
        1. freshness
        2. 2 kinds
          1. mututal
            1. both entities provide each other with assurance
            2. unilateral
              1. authentication of one entitiy to another
                1. ex. ATM
            3. can only be provided at one moment in time
            4. used in 2 types of situatios
              1. access control
                1. part of more complex crypto processes
                2. one approach to entity authentication: zero knowledge mechanisms??
                  1. wikipedia's article very clear!! :)

                    Nota:

                    • http://en.wikipedia.org/wiki/Zero-knowledge_proof#Abstract_example
                    1. useful when parties don't trust each other
                      1. With other authentication methods, some information about a key is leaked every time a transaction takes place.
                        1. 2 entities
                          1. prover
                            1. verifier
                            2. expensive to use
                            3. information used to provide assurance of identity
                              1. what user has
                                1. dumb token
                                  1. ex. card with mag stripe
                                  2. smart token
                                    1. sometimes have built in user interfaces
                                      1. have memory, processor, better storage of crypto info
                                        1. ex. smartcard
                                        2. usually used in combination with some other form of identity assurance like a pin
                                          1. needs some form of reader
                                          2. something the user is
                                            1. biometrics
                                              1. static
                                                1. measures fixed characteristic like fingerprints
                                                2. dynamic
                                                  1. measures characteristics that change slightly like voice
                                                  2. measurements of biometric info are digitalized stored for use
                                                3. something the user knows
                                                  1. passwords, pins, passphrases
                                                    1. most common
                                                      1. problems
                                                        1. length
                                                          1. low complexity
                                                            1. repeated across systems
                                                              1. social engineering
                                                                1. password database attacks
                                                                  1. shoulder surfing
                                                                  2. should be crypto protected at all times
                                                                    1. example of Unix password DB
                                                                      1. when user attempts login, system pulls user hash from DB & applies to special DES implementation
                                                                        1. covert password to 56 bit DES key and encrypt plaintext of all 0s 25 times
                                                                          1. check to see if resulting value equals value stored in DB for password
                                                                        2. dynamic passwords

                                                                          Adjunto:

                                                                          1. one time password schemes
                                                                            1. 2 parts
                                                                              1. password function
                                                                                1. implemented on a smart token
                                                                                  1. this results in 2 factor authentication
                                                                                2. input
                                                                                  1. must be fresh (uses freshness mechanism)
                                                                                3. analysis
                                                                                  1. every time new auth challenge issued
                                                                                    1. local use of pin
                                                                                      1. 2 factor authentication
                                                                                    2. advantages
                                                                                      1. limits exposure
                                                                                        1. not repeatable
                                                                                  Mostrar resumen completo Ocultar resumen completo

                                                                                  Similar

                                                                                  Crypto U8, example dynamic password scheme
                                                                                  jjanesko
                                                                                  Crypto U8 (part 2), Freshness
                                                                                  jjanesko
                                                                                  Crypto U8 (part 1), Randomness
                                                                                  jjanesko
                                                                                  Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
                                                                                  jjanesko
                                                                                  Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
                                                                                  jjanesko
                                                                                  Crypto U3, Theoretical vs. Practical Security
                                                                                  jjanesko
                                                                                  Crypto U1, Basic Principles
                                                                                  jjanesko
                                                                                  Crypto U4, Stream Cipher
                                                                                  jjanesko
                                                                                  Crypto U4, Block Cipher, Counter Mode
                                                                                  jjanesko
                                                                                  Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
                                                                                  jjanesko
                                                                                  Crypto U2, Crypto design principles
                                                                                  jjanesko