User Authentication Protocols
This class lecture covers the following topics:
- User Authentication
- Replay Attacks
- Needham Schroeder Protocol
- Denning’s Modification
- Corrected Protocol
- One-Way Authentication for Email
- Kerberos V4 Message Exchange
- Kerberos V4 Concepts
- Key Design Principles
- Inter-Realm Authentication
- Privacy and Integrity
- Kerberos V4 Issues
- ASN.1
- Encoding Rules
- BER Example
- Kerberos V5
- Kerberos V5 Messages
- Kerberos V5 Flags
- Remote User Authentication Using Public Keys
- Federated Identity Management
- Federated Identity Operation
- Standards for Federated ID Management
Presentation slides in Adobe Acrobat Format:
1 slide/page
View Slides+Audio (
Part 1,
Part 2
)
Right Click and save to download Slides+Audio (
Part 1,
Part 2
) podcast.
Frequently asked questions about remote audio/video viewing
Back to other lectures of the series
Complete List of Audio/Video Lectures by Raj Jain
Back to Raj Jain's Home Page