Computer Security- Lecture 3- late post

Computer security- authentication protocols

Reference: Modelling and analysis of security protocols by Peter Ryan and co


3 types of authentication
Aliveness
Mutual communication
Message agreement
This is a set up- can see bob and alice communicate through server


So, what is the live aliveness?
Simply requires that only that an agent is detected to be alive and running in some protocol session

Mutual is same but goes through server first

Entity authentication- 2 agents agree on top of mutual communication that some communicated data

Message origin

Authentication directionality
One way- only 1 agent authenticates the other
2 way- authenticate each other


So can see A is telling it is A and sending data with k straight to be

B sends that back with the key to server
As well as the data given by A


2 way- easier to understand

Comments