Outline for December 4, 2006
Reading
: §12.2.3–12.6; 14.1–14.4
Greetings and felicitations!
Puzzle of the day
Password aging
Pick age so when password is guessed, it's no longer valid
Implementation: track previous passwords vs. upper, lower time bounds
Ultimate in aging: One-Time Password
Password is valid for only one use
May work from list, or new password may be generated from old by a function
Challenge-response systems
Computer issues challenge, user presents response to verify secret information known/item possessed
Example operations:
f
(
x
) =
x
+1, random, string (for users without computers), time of day, computer sends
E
(
x
), you answer
E
(
D
(
E
(
x
))+1)
Note: password never sent on wire or network
Biometrics
Depend on physical characteristics
Examples: pattern of typing (remarkably effective), retinal scans, etc.
Location
Bind user to some location detection device (human, GPS)
Authenticate by location of the device
Identity
Principal and identity
Users, groups, roles
Identity on the web
Host identity: static and dynamic identifiers
You can also obtain a PDF version of this.
Version of November 29, 2006 at 7:35 AM