tailieunhanh - Lecture Data security and encryption - Lecture 22: User Authentication

The contents of this chapter include all of the following: Remote user authentication issues, authentication using symmetric encryption, the Kerberos trusted key server system, authentication using asymmetric encryption, federated identity management. | Data Security and Encryption (CSE348) Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 5/e, by William Stallings, briefly reviewing the text outline from Ch 0, and then presenting the content from Chapter 1 – “Introduction”. Lecture # 22 Review have considered: symmetric key distribution using symmetric encryption symmetric key distribution using public-key encryption distribution of public keys announcement, directory, authrority, CA authentication and certificates Chapter 14 summary. Chapter 15 – User Authentication Opening quote. We cannot enter into alliance with neighboring princes until we are acquainted with their designs. —The Art of War, Sun Tzu Opening quote. User Authentication This chapter examines some of the authentication functions that have been developed to support network-based use authentication User authentication is the fundamental building block and the primary line of defense User authentication is the basis for most types of access control and for user accountability This chapter examines some of the authentication functions that have been developed to support network-based use authentication. In most computer security contexts, user authentication is the fundamental building block and the primary line of defense. User authentication is the basis for most types of access control and for user accountability. RFC 2828 defines user authentication as the process of verifying an identity claimed by or for a system entity. An authentication process consists of two steps: Identification step: Presenting an identifier to the security system. (Identifiers should be assigned carefully, because authenticated identities are the basis for other security services, such as access control service.) Verification step: Presenting or generating authentication information that corroborates the binding between the entity and the identifier.” In essence, identification is the means by . | Data Security and Encryption (CSE348) Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 5/e, by William Stallings, briefly reviewing the text outline from Ch 0, and then presenting the content from Chapter 1 – “Introduction”. Lecture # 22 Review have considered: symmetric key distribution using symmetric encryption symmetric key distribution using public-key encryption distribution of public keys announcement, directory, authrority, CA authentication and certificates Chapter 14 summary. Chapter 15 – User Authentication Opening quote. We cannot enter into alliance with neighboring princes until we are acquainted with their designs. —The Art of War, Sun Tzu Opening quote. User Authentication This chapter examines some of the authentication functions that have been developed to support network-based use authentication User authentication is the fundamental building block and the primary line of defense User .