1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part...
-
Upload
grant-chester-jennings -
Category
Documents
-
view
219 -
download
0
description
Transcript of 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part...
![Page 1: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/1.jpg)
1
Number Theory and Advanced Cryptography 9. Authentication Protocols
Chih-Hung WangSept. 2011
Part I: Introduction to Number TheoryPart II: Advanced Cryptography
![Page 2: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/2.jpg)
2
Basic Authentication Techniques Challenge-Response Mechanisms
![Page 3: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/3.jpg)
3
Manipulation Detection Code
![Page 4: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/4.jpg)
4
Applying Asymmetric Cryptographic Technique
Nonce Importance:
![Page 5: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/5.jpg)
5
Standardization of the Challenge-Response Mechanism
Unilateral entity authentication
ISO Two-Pass Unilateral Authentication Protocol
![Page 6: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/6.jpg)
6
Using a Cryptography Check Function (CCF)
![Page 7: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/7.jpg)
7
ISO Public Key Two-Pass Unilateral Authentication Protocol
![Page 8: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/8.jpg)
8
Timestamp Mechanism
![Page 9: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/9.jpg)
9
Using MDC
![Page 10: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/10.jpg)
10
Applying Asymmetric Cryptographic Techniques
![Page 11: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/11.jpg)
11
Standardization of Timestamp Mechanism
ISO Symmetric Key One-Pass Unilateral Authentication Protocol
![Page 12: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/12.jpg)
12
CCF & Public Key Techniques
![Page 13: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/13.jpg)
13
Non-standard Mechanisms
![Page 14: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/14.jpg)
14
Mutual Authentication
![Page 15: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/15.jpg)
15
Wiener’s Attack
![Page 16: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/16.jpg)
16
Involving Trusted Third PartyThe Woo-Lam Protocol
![Page 17: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/17.jpg)
17
Password-based Authentication
![Page 18: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/18.jpg)
18
Needham’s Password Protocol
![Page 19: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/19.jpg)
19
A One-time Password Scheme
![Page 20: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/20.jpg)
20
Attack of S/KEY: Man-in-the-Middle Attack
Page 371
![Page 21: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/21.jpg)
21
Encrypted Key Exchange (EKE) (1)
Off-lineDictionaryAttack
![Page 22: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/22.jpg)
22
Encrypted Key Exchange (EKE) (2)
![Page 23: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/23.jpg)
23
Authenticated Key Exchange The Station-to-Station (STS) Protocol
Mutual Entity Authentication Mutually Authenticated Key Agreement Mutual Key Confirmation Perfect Forward Secrecy (PFS) *Anonymity (Deniability)
![Page 24: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/24.jpg)
24
STS Protocol
![Page 25: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/25.jpg)
25
A Flaw in a Simplified STS protocol (1)
![Page 26: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/26.jpg)
26
A Flaw in a Simplified STS protocol (2)
![Page 27: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/27.jpg)
27
A minor Flaw of the STS Protocol
Perfect denial of serviceattack
![Page 28: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/28.jpg)
28
Typical Attacks on Authentication Protocols
Message Replay Attack (page 43,44)
![Page 29: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/29.jpg)
29
Message Replay Attack
![Page 30: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/30.jpg)
30
Parallel Session Attack (1)
![Page 31: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/31.jpg)
31
Parallel Session Attack (2)
![Page 32: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/32.jpg)
32
Reflection Attack
![Page 33: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/33.jpg)
33
Attack Due to Type Flaw (1)
![Page 34: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/34.jpg)
34
Attack Due to Type Flaw (2)
![Page 35: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/35.jpg)
35
Attack Due to Name Omission
![Page 36: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/36.jpg)
36
Attack Due to Misuse of Cryptographic Services Attack due to absence of data-integrity
protection Confidentiality failure due to absence of
“semantic security” protection
![Page 37: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/37.jpg)
37
A Minor Variation of the Otway-Rees Protocol
![Page 38: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/38.jpg)
38
An Attack
![Page 39: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/39.jpg)
39
Authentication Protocols for Internet Security
Internet Protocol Security (IPSec)
![Page 40: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/40.jpg)
40
Confidentiality Protection in IPSec Encapsulating Security Payload (ESP)
![Page 41: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/41.jpg)
41
The Internet Key Exchange (IKE) Protocol (1)
![Page 42: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/42.jpg)
42
The Internet Key Exchange (IKE) Protocol (2)
![Page 43: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/43.jpg)
43
Authentication Failure
![Page 44: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/44.jpg)
44
Signature-based IKE Phase 1 Aggressive Mode
![Page 45: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/45.jpg)
45
A Plausible Deniability Feature in IKE
Plausible Deniability:Permit an entity to deny “plausibly” the existence of a connection with aCommunication partner
![Page 46: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/46.jpg)
46
The Secure Shell (SSH) Remote Login Protocol (1) The SSH Architecture
The SSH Transport Layer Protocol Unilaterally authenticated secure channel from the
server to the client The SSH User Authentication Protocol
Unilateral authentication protocols to achieve entity authentication from a client-side user to the server
The SSH Connection protocol
![Page 47: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/47.jpg)
47
The Secure Shell (SSH) Remote Login Protocol (2)
![Page 48: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/48.jpg)
48
The Secure Shell (SSH) Remote Login Protocol (3)
![Page 49: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.](https://reader035.fdocuments.net/reader035/viewer/2022081521/5a4d1af07f8b9ab05997d789/html5/thumbnails/49.jpg)
49
The Secure Shell (SSH) Remote Login Protocol (4)