100 likes | 117 Views
Learn about strong authentication methods using challenge-response protocols. Explore network, host, and workstation authentication techniques, including user IDs, secret keys, and encrypted responses.
E N D
CHALLENGE-RESPONSE AUTHENTICATION Prof. Ravi Sandhu
STRONG AUTHENTICATIONCHALLENGE RESPONSE NETWORK HOST WORK STATION User ID Challenge Response
CHALLENGE RESPONSE Secret Key Challenge Encrypt Response
CHALLENGE RESPONSE Secret Key Challenge HMAC Response
TIME SYNCHRONIZED NETWORK HOST WORK STATION User ID One Time Password
TIME SYNCHRONIZED Secret Key Time HMAC One Time Password
PUBLIC KEY SIGNATURE BASED Private Key Challenge Sign Response=signed(challenge)
PUBLIC KEY SIGNATURE BASED Private Key Time Sign Response=signed(Time)
PUBLIC KEY ENCRYPTION BASED Private Key Challenge=Encrypt(Response) Decrypt Response
PUBLIC KEY ENCRYPT BASED Private Key Time verify Encrypt(Decrypted(Time)) Decrypt Response=Decrypted(Time)