Challenge-Response Authentication CS 5323 Challenge-Response Authentication Prof. Ravi Sandhu Executive Director and Endowed Chair Lecture 5 ravi.utsa@gmail.com www.profsandhu.com © Ravi Sandhu World-Leading Research with Real-World Impact!
Challenge-Response Authentication NETWORK HOST WORK STATION User ID Challenge Response © Ravi Sandhu World-Leading Research with Real-World Impact! 2
Vulnerable to man-in-the-middle Challenge-Response Authentication NETWORK HOST WORK STATION User ID Challenge Vulnerable to man-in-the-middle attacks Response © Ravi Sandhu World-Leading Research with Real-World Impact! 3
Time Synchronized NETWORK WORK HOST STATION User ID Challenge = Time Response One Time Password © Ravi Sandhu World-Leading Research with Real-World Impact! 4
Symmetric Key Based Symmetric Key Challenge Encrypt Response © Ravi Sandhu World-Leading Research with Real-World Impact! 5
Implicit challenge = Time Time Synchronized Implicit challenge = Time Symmetric Key Time Encrypt Response One-Time Password © Ravi Sandhu World-Leading Research with Real-World Impact! 6
Symmetric Key Based Symmetric Key Challenge MAC Response © Ravi Sandhu World-Leading Research with Real-World Impact! 7
Asymmetric Key Based Private Key Challenge Sign Response © Ravi Sandhu World-Leading Research with Real-World Impact! 8