Monday, April 21, 2008

Week 10

Mar 25, Tu, 2008 (Lecture 12): We started discussing authentication protocols, which
are of two types (one using symmetric key and other using public key cryptography). We covered the Needham-Schroeder and the Denning protocol. We also discussed one-way
authentication protocols, which is useful for applications such as email.

Mar 27, Th, 2008 (Lecture 13): We started discussing Kerberos, a widely used distributed
authentication protocol. We discussed the protocol in versions, each version adding a feature
to address attacks in the previous version. Please read the discussion of Kerberos in
the book.

No comments: