Presentation is loading. Please wait.

Presentation is loading. Please wait.

Challenge-Response Authentication

Similar presentations


Presentation on theme: "Challenge-Response Authentication"— Presentation transcript:

1 Challenge-Response Authentication
CS 5323 Challenge-Response Authentication Prof. Ravi Sandhu Executive Director and Endowed Chair Lecture 9 © Ravi Sandhu World-Leading Research with Real-World Impact!

2 Challenge-Response Authentication
NETWORK HOST WORK STATION User ID Challenge Response © Ravi Sandhu World-Leading Research with Real-World Impact! 2

3 Vulnerable to man-in-the-middle
Challenge-Response Authentication NETWORK HOST WORK STATION User ID Challenge Vulnerable to man-in-the-middle attacks Response © Ravi Sandhu World-Leading Research with Real-World Impact! 3

4 Time Synchronized NETWORK WORK HOST STATION User ID Challenge = Time
Response One Time Password © Ravi Sandhu World-Leading Research with Real-World Impact! 4

5 Secret Key Based Secret Key Challenge Encrypt Response
© Ravi Sandhu World-Leading Research with Real-World Impact! 5

6 Implicit challenge = Time
Time Synchronized Implicit challenge = Time Secret Key Time Encrypt Response One-Time Password © Ravi Sandhu World-Leading Research with Real-World Impact! 6

7 Secret Key Based Secret Key Challenge MAC Response
© Ravi Sandhu World-Leading Research with Real-World Impact! 7

8 Asymmetric Key Based Private Key Challenge Sign Response
© Ravi Sandhu World-Leading Research with Real-World Impact! 8

9 Asymmetric Key Based Private Key Challenge Decrypt Response
© Ravi Sandhu World-Leading Research with Real-World Impact! 9


Download ppt "Challenge-Response Authentication"

Similar presentations


Ads by Google