490 likes | 505 Views
Number Theory and Advanced Cryptography 9. Authentication Protocols. Chih-Hung Wang Sept. 2011. Part I: Introduction to Number Theory Part II: Advanced Cryptography. Basic Authentication Techniques. Challenge-Response Mechanisms. Manipulation Detection Code.
E N D
Number Theory and Advanced Cryptography9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced Cryptography
Basic Authentication Techniques • Challenge-Response Mechanisms
Applying Asymmetric Cryptographic Technique Nonce Importance:
Standardization of the Challenge-Response Mechanism Unilateral entity authentication ISO Two-Pass Unilateral Authentication Protocol
Standardization of Timestamp Mechanism ISO Symmetric Key One-Pass Unilateral Authentication Protocol
Involving Trusted Third Party The Woo-Lam Protocol
Attack of S/KEY: Man-in-the-Middle Attack • Page 371
Encrypted Key Exchange (EKE) (1) Off-line Dictionary Attack
Authenticated Key Exchange • The Station-to-Station (STS) Protocol • Mutual Entity Authentication • Mutually Authenticated Key Agreement • Mutual Key Confirmation • Perfect Forward Secrecy (PFS) • *Anonymity (Deniability)
A minor Flaw of the STS Protocol Perfect denial of service attack
Typical Attacks on Authentication Protocols • Message Replay Attack (page 43,44)
Attack Due to Misuse of Cryptographic Services • Attack due to absence of data-integrity protection • Confidentiality failure due to absence of “semantic security” protection
Authentication Protocols for Internet Security • Internet Protocol Security (IPSec)
Confidentiality Protection in IPSec • Encapsulating Security Payload (ESP)
A Plausible Deniability Feature in IKE Plausible Deniability: Permit an entity to deny “plausibly” the existence of a connection with a Communication partner
The Secure Shell (SSH) Remote Login Protocol (1) • The SSH Architecture • The SSH Transport Layer Protocol • Unilaterally authenticated secure channel from the server to the client • The SSH User Authentication Protocol • Unilateral authentication protocols to achieve entity authentication from a client-side user to the server • The SSH Connection protocol