Podcast
Questions and Answers
What is the goal of the authentication protocol in ap3.1?
What is the goal of the authentication protocol in ap3.1?
What is the purpose of the Authentication number in the protocol?
What is the purpose of the Authentication number in the protocol?
What is the requirement for the Authentication number in ap4.0?
What is the requirement for the Authentication number in ap4.0?
How does Alice prove she is 'live' in ap4.0?
How does Alice prove she is 'live' in ap4.0?
Signup and view all the answers
What is the limitation of ap4.0?
What is the limitation of ap4.0?
Signup and view all the answers
What is the motivation behind ap5.0?
What is the motivation behind ap5.0?
Signup and view all the answers
What is the password to enter Moria in the context of J.R.R. Tolkien's story?
What is the password to enter Moria in the context of J.R.R. Tolkien's story?
Signup and view all the answers
What is the primary goal of authentication in the context of network communication?
What is the primary goal of authentication in the context of network communication?
Signup and view all the answers
What is the flaw in Protocol ap2.0?
What is the flaw in Protocol ap2.0?
Signup and view all the answers
What type of attack can be launched against Protocol ap3.0?
What type of attack can be launched against Protocol ap3.0?
Signup and view all the answers
What improvement does Protocol ap3.1 offer over Protocol ap3.0?
What improvement does Protocol ap3.1 offer over Protocol ap3.0?
Signup and view all the answers
Why is Protocol ap1.0 not secure?
Why is Protocol ap1.0 not secure?
Signup and view all the answers
What is the primary purpose of a trusted CA in the SSL protocol?
What is the primary purpose of a trusted CA in the SSL protocol?
Signup and view all the answers
What is the primary weakness in the ap5.0 protocol?
What is the primary weakness in the ap5.0 protocol?
Signup and view all the answers
What is the symmetric session key used for in the SSL protocol?
What is the symmetric session key used for in the SSL protocol?
Signup and view all the answers
What is the purpose of a Key Distribution Center (KDC)?
What is the purpose of a Key Distribution Center (KDC)?
Signup and view all the answers
What is the benefit of using client certificates in SSL?
What is the benefit of using client certificates in SSL?
Signup and view all the answers
What is the problem with public key cryptography?
What is the problem with public key cryptography?
Signup and view all the answers
What is the relationship between SSL and TLS?
What is the relationship between SSL and TLS?
Signup and view all the answers
What is the role of a Trusted Certification Authority (CA)?
What is the role of a Trusted Certification Authority (CA)?
Signup and view all the answers
What is an example of a non-Web application that can use SSL?
What is an example of a non-Web application that can use SSL?
Signup and view all the answers
What is the primary function of a Certificate Authority (CA)?
What is the primary function of a Certificate Authority (CA)?
Signup and view all the answers
How does a KDC enable Alice and Bob to communicate with each other?
How does a KDC enable Alice and Bob to communicate with each other?
Signup and view all the answers
What is the symmetric key problem?
What is the symmetric key problem?
Signup and view all the answers
What does Alice use to obtain Bob's public key?
What does Alice use to obtain Bob's public key?
Signup and view all the answers
What is the purpose of a digital signature in a certificate?
What is the purpose of a digital signature in a certificate?
Signup and view all the answers
What is the primary goal of the Key Distribution Center (KDC) in the KA-KDC protocol?
What is the primary goal of the Key Distribution Center (KDC) in the KA-KDC protocol?
Signup and view all the answers
What is the primary benefit of using SSL in web browsers?
What is the primary benefit of using SSL in web browsers?
Signup and view all the answers
What information does a certificate contain?
What information does a certificate contain?
Signup and view all the answers
Study Notes
Authentication
- Goal: Bob wants Alice to "prove" her identity to him
- Protocol ap1.0: Alice says "I am Alice" (insufficient as Trudy can declare herself to be Alice)
- Protocol ap2.0: Alice says "I am Alice" in an IP packet containing her source IP address (Trudy can create a packet "spoofing" Alice's address)
- Protocol ap3.0: Alice says "I am Alice" and sends her secret password to "prove" it (vulnerable to playback attack)
Authentication: Another Try
- Protocol ap3.1: Alice says "I am Alice" and sends her encrypted secret password to "prove" it (secure against playback attack)
- Authentication number: used to confirm the speaker's identity, used only once in a lifetime
- Protocol ap4.0: Bob sends Alice an authentication number, R, which Alice must return encrypted with a shared secret key (proves Alice is live and is the only one who knows the key to encrypt R)
- Drawback of ap4.0: requires shared symmetric key
Public Key Techniques
- Protocol ap5.0: uses authentication number/nonce and public key cryptography (avoids shared symmetric key)
- Alice sends "I am Alice" and R, encrypted with her private key, to Bob
- Bob computes KA(R) and knows only Alice could have encrypted R such that KA(R) = R
Network Security
- Cryptography: symmetric and public, basic techniques and tradeoffs
- Authentication: common styles of attack
- Key distribution: why it is needed and its uses (secure email, secure transport, IPsec, 802.11 WEP)
Key Distribution
- Symmetric key problem: how to establish a shared secret key over a network
- Public key problem: how to ensure the public key obtained is genuine and not Trudy's
- Solution: trusted intermediaries (Key Distribution Center, KDC, or Trusted Certification Authority, CA)
Key Distribution Center (KDC)
- Server shares different secret key with each registered user
- Alice and Bob know their own symmetric keys for communicating with KDC
- KDC generates R1, which Alice and Bob use as a session key for shared symmetric encryption
Certification Authorities
- Certification authority (CA): binds public key to particular entity
- Entity registers its public key with CA and provides "proof of identity"
- CA creates a certificate binding entity to its public key, digitally signed by CA
- Certificate contains entity's public key, identifying information, and digital signature
Secure Sockets Layer (SSL)
- Provides transport layer security to any TCP-based application
- Security services: server authentication, data encryption, and client authentication (optional)
- SSL-enabled browser includes public keys for trusted CAs
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Learn about authentication protocols and goals, including difficulties in verifying identities online. Discover how Alice can prove her identity to Bob in a network.