From Passwords to Public keys Chapter 10 ~ Chapter 12 Authentication From Passwords to Public keys Chapter 10 ~ Chapter 12
Challenge Response Passwords Chapter 10 Challenge Response Passwords
Figure 10.1
Figure 10.2
Table 10.1: Password Tokens and Average Attack Spaces
Figure 10.3
Figure 10.4
Figure 10.5
Figure 10.6
Figure 10.7
Figure 10.8
Table 10.2: Attack Summary
Table 10.2: Attack Summary (Continued)
Table 10.3: Defense Summary
Indirect Authentication Chapter 11 Indirect Authentication
Figure 11.1
Figure 11.2
Figure 11.3
Figure 11.4
Figure 11.5
Figure 11.6
Figure 11.7
Figure 11.8
Table 11.1: Attack Summary
Table 11.2: Defense Summary
Chapter 12 Kerberos and Windows 2000
Figure 12.1
Figure 12.2
Figure 12.3
Figure 12.4
Table 12.1: Essential Contents of a Kerberos Ticket
Figure 12.5
Figure 12.6
Figure 12.7
Figure 12.8
Figure 12.9
Figure 12.10
Table 12.2: Attack Summary
Table 12.3: Defense Summary
Table 12.3: Defense Summary (Continued)