Challenge-Response Authentication

Slides:



Advertisements
Similar presentations
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director February © Ravi Sandhu.
Advertisements

Symmetric Message Authentication Codes Prof. Ravi Sandhu.
1 New Trends and Challenges in Computer Network Security Ravi Sandhu Executive Director and Endowed Professor September 2010
1 Cyber Security Research: A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 18, 2013
1 Privacy Prof. Ravi Sandhu Executive Director and Endowed Chair March 8, © Ravi Sandhu World-Leading Research.
1 Authentication with Passwords Prof. Ravi Sandhu Executive Director and Endowed Chair February 1, © Ravi.
1 Federated Identity and Single-Sign On Prof. Ravi Sandhu Executive Director and Endowed Chair February 15, 2013
1 Plenary Panel on Cloud Security and Privacy: What is new and What needs to be done? Ravi Sandhu Executive Director and Endowed Professor December 2010.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
1 Privacy and Access Control: How are These Two Concepts Related? Prof. Ravi Sandhu Executive Director and Endowed Chair SACMAT Panel June 3, 2015
1 Cyber Security Grand Challenges and Prognosis Prof. Ravi Sandhu Executive Director and Endowed Chair
1 Institute for Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair February 4, 2015
1 Big Data Applications in Cloud and Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Professor UTSA COB Symposium on Big Data, Big Challenges.
1 Virtualization Prof. Ravi Sandhu Executive Director and Endowed Chair February 7, © Ravi Sandhu World-Leading.
1 The Quest for Single-Sign On Prof. Ravi Sandhu Executive Director and Endowed Chair February 8, © Ravi Sandhu.
1 Cloud Computing and Security Prof. Ravi Sandhu Executive Director and Endowed Chair April 19, © Ravi Sandhu.
1 Panel on Data Usage Management: Technology or Regulation? Prof. Ravi Sandhu Executive Director and Endowed Chair DUMA 2013 May 23, 2013
1 Cyber Security A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 15, 2016
1 Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair CODASPY 2013 February.
1 Open Discussion PSOSM 2012 Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 Understanding Which New Threats Operators Can Expect To Face Within The Next Two To Five Years To Improve The On- Going Management Of Security Systems.
1 Role-Based Access Control (RBAC) Prof. Ravi Sandhu Executive Director and Endowed Chair January 29, © Ravi.
1 Secure Cloud Computing: A Research Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair Texas Fresh Air Big Data and Data Analytics Conference.
Executive Director and Endowed Chair
Executive Director and Endowed Chair
Intrusion Detection Evaluation
Executive Director and Endowed Chair
Symmetric Cryptography
Executive Director and Endowed Chair
Asymmetric Cryptography
What can Technologists learn from the History of the Internet?
Security and Privacy in the Networked World
Discretionary Access Control (DAC)
Executive Director and Endowed Chair
Introduction to Cyber Security
Introduction and Basic Concepts
Cryptography Basics and Symmetric Cryptography
Authentication by Passwords
Role-Based Access Control (RBAC)
Identity and Access Control in the
Executive Director and Endowed Chair
Executive Director and Endowed Chair
Internet Security Threat Status
Executive Director and Endowed Chair
Cyber Security Research: Applied and Basic Combined*
On the Value of Access Control Models
Challenge-Response Authentication
ABAC Panel Prof. Ravi Sandhu Executive Director and Endowed Chair
Mandatory Access Control (MAC)
Asymmetric Cryptography
Public-Key Certificates
Discretionary Access Control (DAC)
Executive Director and Endowed Chair
Attribute-Based Access Control (ABAC)
Cyber Security Research: Applied and Basic Combined*
Security and Privacy in the Age of the Internet of Things:
Intersection of Data, Policy and Privacy
Authentication and Authorization Federation
Executive Director and Endowed Chair
Intrusion Detection Evaluation
Cyber Security and Privacy: An Optimist’s Perspective
Identity and Access Control in the
Big Data and Privacy Panel Prof. Ravi Sandhu
Executive Director and Endowed Chair
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
Attribute-Based Access Control (ABAC)
Access Control Evolution and Prospects
World-Leading Research with Real-World Impact!
Access Control Evolution and Prospects
Presentation transcript:

Challenge-Response Authentication CS 5323 Challenge-Response Authentication Prof. Ravi Sandhu Executive Director and Endowed Chair Lecture 5 ravi.utsa@gmail.com www.profsandhu.com © Ravi Sandhu World-Leading Research with Real-World Impact!

Challenge-Response Authentication NETWORK HOST WORK STATION User ID Challenge Response © Ravi Sandhu World-Leading Research with Real-World Impact! 2

Vulnerable to man-in-the-middle Challenge-Response Authentication NETWORK HOST WORK STATION User ID Challenge Vulnerable to man-in-the-middle attacks Response © Ravi Sandhu World-Leading Research with Real-World Impact! 3

Time Synchronized NETWORK WORK HOST STATION User ID Challenge = Time Response One Time Password © Ravi Sandhu World-Leading Research with Real-World Impact! 4

Symmetric Key Based Symmetric Key Challenge Encrypt Response © Ravi Sandhu World-Leading Research with Real-World Impact! 5

Implicit challenge = Time Time Synchronized Implicit challenge = Time Symmetric Key Time Encrypt Response One-Time Password © Ravi Sandhu World-Leading Research with Real-World Impact! 6

Symmetric Key Based Symmetric Key Challenge MAC Response © Ravi Sandhu World-Leading Research with Real-World Impact! 7

Asymmetric Key Based Private Key Challenge Sign Response © Ravi Sandhu World-Leading Research with Real-World Impact! 8