Cryptography - Authentication Protocols, Kerberos

This lesson discusses the use of authentication protocols to obtain keys, and briefly describes the Kerberos private key authentication system.

Objectives

  • the use of authentication protocols to obtain keys
  • Kerberos as a typical authentication server protocol
  • Authentication Protocols

    1. Authentication Protocols
    2. Security Concerns with Authentication Protocols
    3. Timeliness Using Sequence Numbers
    4. Timestamps
    5. Challenge-Response
    6. Needham-Schroeder Protocol
    7. Needham-Schroeder Protocol
    8. Needham-Schroeder Protocol Flaw

    Kerberos - An Example of a Key Server

    1. Authentication Key Server
    2. Kerberos - An Example of a Key Server
    3. Kerberos Overview
    4. Kerberos - Initial User Authentication
    5. Kerberos - Request for a Remote Service
    6. Kerberos - in practise