Entity Authentication and Symmetric Key Establishment - Bart Preneel
Entity Authentication and Symmetric Key Establishment, by Bart Preneel Authentication methods are based on something known, owned, biometric, location or ev...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Bangladesh under the topic 's'.
About this video
Entity Authentication and Symmetric Key Establishment, by Bart Preneel
Authentication methods are based on something known, owned, biometric, location or evidence of trusted third party authentication.
+ A password is a case of something known. Passwords are a vulnerable, but cheap and convenient way of authenticating an entity. Several techniques to augment their effectiveness are in use including challenge-response and one-time passwords.
+ Secure devices such as smart cards and USB tokens often combine the 'owned' with the 'known', since secret keys are locked in the token with a password or PIN code. However, within the broad category of secure tokens, trustworthiness is variable, depending on whether keys can be extracted, passwords can be eavesdropped or the device can be tampered with.
+ Biometry identifies a person via physical characteristics.
+ Location is often used as the sole authentication factor, but is insecure given the relative ease of spoofing IP or MAC addresses.
+ Multi-factor authentication is stronger than single-factor.
+ The Kerberos protocol uses a key distribution-based authentication server. Service consumers must authenticate with a central server to obtain a secret session key with service providers. Such schemes require a single sign-on to access servers across a trust domain.
While public key cryptography is well suited to entity authentication, performance constraints often mandate a symmetric algorithm for encrypting data passed between systems. Key establishment should be linked to authentication, so that a party has assurances that a key is only shared with the authenticated party. The Diffie-Hellman key agreement protocol underlies a host of current technologies such as STS (Station-to-Station protocol) and IKE.
Learning objectives
Gain insight into
+ entity authentication protocols,
+ the benefits and limitations of authentication factors,
+ key establishment protocols,
+ why and how to use authentication servers.
This lecture was delivered by Bart Preneel in Leuven on Tuesday February 11th at SecAppDev 2014.
Professor Bart Preneel heads the COSIC (COmputer Security and Industrial Cryptography) research group at KU Leuven. His main research area is information security with a focus on cryptographic algorithms and protocols as well as their applications to both computer and network security, and mobile communications.
He teaches cryptology, network security and coding theory at the KU Leuven and was visiting professor at the Ruhr Universitaet Bochum (Germany), the T.U.Graz (Austria), the University of Bergen (Norway), and the Universiteit Gent (Belgium). In '93-'94 he was a research fellow at the University of California at Berkeley. He has taught intensive courses around the world.
He undertakes industrial consulting (Mastercard International, S.W.I.F.T., Proton World International,...), and participates in the work of ISO/IEC JTC1/SC27/WG2.
Professor Preneel is Vice President of the International Association for Cryptologic Research (IACR) and co-founder and chairman of LSEC vzw (Leuven Security Excellence Consortium).
Video Information
Views
2.5K
Total views since publication
Likes
14
User likes and reactions
Duration
01:35:00
Video length
Published
Jul 6, 2014
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#Symmetric-key Algorithm #Authentication (Website Category) #Software (Industry) #password #biometry #multi-factor authentication #Kerberos (Internet Protocol) #sso #single sign-on #trust domain #public key cryptography #Cryptography (Software Genre) #asymmetric cryptography #key establishment #key exchange #Diffie-Hellman protocol #IKE
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.