Presentation is loading. Please wait.

Presentation is loading. Please wait.

Challenge-Response Authentication

Similar presentations


Presentation on theme: "Challenge-Response Authentication"— Presentation transcript:

1 Challenge-Response Authentication
CS 5323 Challenge-Response Authentication Prof. Ravi Sandhu Executive Director and Endowed Chair Lecture 5 © Ravi Sandhu World-Leading Research with Real-World Impact!

2 Challenge-Response Authentication
NETWORK HOST WORK STATION User ID Challenge Response © Ravi Sandhu World-Leading Research with Real-World Impact! 2

3 Vulnerable to man-in-the-middle
Challenge-Response Authentication NETWORK HOST WORK STATION User ID Challenge Vulnerable to man-in-the-middle attacks Response © Ravi Sandhu World-Leading Research with Real-World Impact! 3

4 Time Synchronized NETWORK WORK HOST STATION User ID Challenge = Time
Response One Time Password © Ravi Sandhu World-Leading Research with Real-World Impact! 4

5 Symmetric Key Based Symmetric Key Challenge Encrypt Response
© Ravi Sandhu World-Leading Research with Real-World Impact! 5

6 Implicit challenge = Time
Time Synchronized Implicit challenge = Time Symmetric Key Time Encrypt Response One-Time Password © Ravi Sandhu World-Leading Research with Real-World Impact! 6

7 Symmetric Key Based Symmetric Key Challenge MAC Response
© Ravi Sandhu World-Leading Research with Real-World Impact! 7

8 Asymmetric Key Based Private Key Challenge Sign Response
© Ravi Sandhu World-Leading Research with Real-World Impact! 8


Download ppt "Challenge-Response Authentication"

Similar presentations


Ads by Google