Slides for CEN 5540 Computer and Network Security (NTU ST-760-R)
Last modified 2000.06.14
List of Slides
Authentication and Authorization Problem Statement
Authentication
Distributed Authentication
Biometrics
Possession
Third Party Distributed Authentication Models
OSI layers
Network Attacks
Protocol Attacks
Reflection Attack
OSI Pervasive Security Mechanisms
OSI Security Mechanisms
OSI Security Services
Hashes
Hash Algorithms
MD5
MD5 (cont)
Lamport Hash Authentication (S/Key)
Symmetric Crypto
Public Key Crypto
Digital Signatures
Authentication Principles
Diffie-Hellman
Wide Mouth Frog
Needham-Schroeder
Otway-Rees
Kerberos V4
Kerberos V5
Neuman-Stubblebine
DASS
Denning-Sacco
Denning-Sacco Attack
Woo-Lam
PKC Authentication
PKCS-1
PKCS encryption
PKC Key Exchange and Transmission
X.509
IPSO
IPSO SA
IPSO AH
GSS-API
Scaling Issues
Authorization
ACL
Interdomain Authentication and Authorization
Interdomain Authorization Issues
KDC AC Options
VISA Protocol
PASS Protocol
SESAME Architecture
SESAME Application View
Key Handling
back to CEN 5540 home page
This document is
copyright 2000
by Richard E. Newman.
Send comments to
nemo@cise.ufl.edu