Download presentation
Presentation is loading. Please wait.
Published byShannon Gregory Modified over 9 years ago
1
User Authentication By Eric Sita
3
Message Security Privacy: To expect confidentiality from a sender. Authentication: To be sure of someone's identity. Integrity: Make sure message arrives as sent. Nonrepudiation: To prove a message came from a particular sender.
4
Methods Covered Use of a symmetric Key Using a nonce Bi-directional SSH example
5
Symmetric Key
6
Using a nonce
7
Bi-directional
8
Example System SSH – Used for our UNIX accounts Consists of three protocols: 1) SSH-TRANS -Transport Layer Protocol 2) SSH-AUTH - Authentication Protocol 3) SSH-CONN - Connection Protocol
9
SSH-TRANS Provide an encrypted channel between client and server Runs on top of a TCP connection This is first step in logging on to system Uses RSA to authenticate Establish a session key
10
SSH-AUTH Three methods: 1) Since connection is secure send password 2) Public key encryption 3) Host-based authentication
11
Extra Info on SSH OpenSSH a package on most UNIX systems supports the command, “SSH- keygen” to create private/public key pairs Is used on other TCP applications like X Windows and IMAP mailers, otherwise known as “SSH tunnel” This is called Port Forwarding, used in the SSH-CONN protocol
12
SSH Example
13
References Forouzan, Behrouz Data Communications and Networking McGraw-Hill 2004 Peterson, Larry Computer Networks A Systems Approach Morgan Kaufman 2003 Leon-Garcia, Alberto Communication Networks McGraw-Hill 2000
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.