SchemesforNetworkApplications在电脑网路应用环境中的.pptVIP

  • 2
  • 0
  • 约7.25千字
  • 约 35页
  • 2018-12-31 发布于天津
  • 举报

SchemesforNetworkApplications在电脑网路应用环境中的.ppt

SchemesforNetworkApplications在电脑网路应用环境中的.ppt

Authentication and Key Agreement Schemes for Network Applications 在電腦網路應用環境中的身份認證與金鑰協議技術之研究 Advisor: Dr. Chin-Chen Chang Student: Hao-Chuan Tsai Date: 12.30.2010 Department of Computer Science and Information Engineering, National Chung Cheng University Outline Part I: Authentication Scheme with Key Agreement three party authenticated key agreement Part II: Anonymous Authentication Scheme for Wireless Networks Part I: Authentication Scheme with Key Agreement User Authentication Goal: Convince system of your identity before it can act on your behalf Methods Who you are What you know What you have User Authentication (cont.) What you have Verify identity based on possession of some object Magnetic Card Smart Card (IC Card) User Authentication (cont.) Who you are verify identity based on your physical characteristics or involuntary response patterns known as biometrics characteristics used include: signature (usually dynamic) fingerprint hand geometry face or body profile speech retina pattern always have tradeoff between false rejection and false acceptance User Authentication (cont.) What you know Birthday, School name, Blood type, or Salary ? Meaningful Secrets ? Meaningless Secrets (Passwords) ! Traditional Password Mechanism Procedure: 1. Prompt user for a login name and password 2. Verify identity by checking that password is correct Passwords in the System: May be stored in clear mode May be stored in cipher mode: Encrypted or One-Way Hashed Passwords should be selected with care to reduce risk of exhaustive search One problem with traditional passwords is caused by eavesdropping their transfer over an insecure network User Authentication (cont.) Password Practice Password Complexity Criteria At least 7 characters long. Does not contain your User Name, Real Name, or Company Name. Does not contain a complete dictionary word. Is significantly different from previous passwords. Contains characters from each of the fo

文档评论(0)

1亿VIP精品文档

相关文档