Computer Security- Lecture 3- late post
Computer security- authentication protocols
Reference: Modelling and analysis of security protocols by Peter Ryan and co
3 types of authentication
Aliveness
Mutual communication
Message agreement
This is a set up- can see bob and alice communicate through server
So, what is the live aliveness?
Simply requires that only that an agent is detected to be alive and running in some protocol session
Mutual is same but goes through server first
Entity authentication- 2 agents agree on top of mutual communication that some communicated data
Message origin
Authentication directionality
One way- only 1 agent authenticates the other
2 way- authenticate each other
So can see A is telling it is A and sending data with k straight to be
B sends that back with the key to server
As well as the data given by A
2 way- easier to understand
Comments
Post a Comment