通俗易懂的描述对称加密的原理,从最简单的加密方法开始,慢慢解释到需要认证机构的加密方式。
Authentication Protocols and Key Establishment
• Like cryptographic algorithms, the design of an
authentication algorithm requires a lot of skill and
care – don't do this at home!
• Using KDCs and CAs allows communication with
unrelated peers – trusted intermediate
• Performance considerations impact on the design of
authentication algorithms
• Randomness is both tricky to achieve and important
for the result
资源详情
资源评论
1
Authentication Protocols and Key
Establishment
Peter Sjödin
psj@kth.se
Based on material by VitalyShmatikov, Univ. of Texas, and by
the previous course teachers
2
Authentication & handshakes
•Authentication & pitfalls
•Trusted intermediates
•Performance & randomness
3
Basic Problem
?
How do you prove to someone that
you are who you claim to be?
Any system with access control must solve this problem
评论0
最新资源