Download presentation
Presentation is loading. Please wait.
1
Challenge-Response Authentication
CS 5323 Challenge-Response Authentication Prof. Ravi Sandhu Executive Director and Endowed Chair Lecture 9 © Ravi Sandhu World-Leading Research with Real-World Impact!
2
Challenge-Response Authentication
NETWORK HOST WORK STATION User ID Challenge Response © Ravi Sandhu World-Leading Research with Real-World Impact! 2
3
Vulnerable to man-in-the-middle
Challenge-Response Authentication NETWORK HOST WORK STATION User ID Challenge Vulnerable to man-in-the-middle attacks Response © Ravi Sandhu World-Leading Research with Real-World Impact! 3
4
Time Synchronized NETWORK WORK HOST STATION User ID Challenge = Time
Response One Time Password © Ravi Sandhu World-Leading Research with Real-World Impact! 4
5
Secret Key Based Secret Key Challenge Encrypt Response
© Ravi Sandhu World-Leading Research with Real-World Impact! 5
6
Implicit challenge = Time
Time Synchronized Implicit challenge = Time Secret Key Time Encrypt Response One-Time Password © Ravi Sandhu World-Leading Research with Real-World Impact! 6
7
Secret Key Based Secret Key Challenge MAC Response
© Ravi Sandhu World-Leading Research with Real-World Impact! 7
8
Asymmetric Key Based Private Key Challenge Sign Response
© Ravi Sandhu World-Leading Research with Real-World Impact! 8
9
Asymmetric Key Based Private Key Challenge Decrypt Response
© Ravi Sandhu World-Leading Research with Real-World Impact! 9
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.