User Authentication Protocols
This lecture covers the following topics:
- User Authentication
- Replay Attacks
- Needham Schroeder Protocol
- Denning’s Modification
- Corrected Protocol
- One-Way Authentication for Email
- Overview of Kerberos
- Sample Kerberos Exchange
- Kerberos V4 Concepts
- Key Design Principles
- Kerberos V4 Message Exchange
- Inter-Realm Authentication
- Privacy and Integrity
- Kerberos V4 Issues
- Kerberos V5
- Kerberos V5 Messages
- Kerberos V5 Messages
- Kerberos V5 Flags
- Remote User Authentication Using Public Keys
- Federated Identity Management
- Federated Identity Operation
- Standards for Federated ID Management
- Summary
Presentation slides in Adobe Acrobat Format:
1 slide/page
View Slides+Audio: Part 1
, Part 2
, Part 3
(on YouTube)
View Slides+Audio: Part 1
, Part 2
, Part 3
(Using Flash)
Right click and save to download
Slides+Audio:
Part 1,
Part 2,
Part 3
podcast.
Frequently asked questions about remote audio/video viewing
Back to other lectures of the series
Complete List of Audio/Video Lectures by Raj Jain
Back to Raj Jain's Home Page