"Network Security 0-100" Agreement & Certification

1 authentication protocol

1.1 Password protocol

The simplest authentication protocol. Password/password, PIN are typical examples.

1.2 One-way authentication

Send the serial number + authentication block, the authentication block includes the serial number + Nonce, Nonce is unique to each person. 95e041aaea2b47c0aa965bbcff217e92.jpg

 Authentication process:

get serial number

decrypt [to]

verified to

verified to

On the implementation of Nonce:

Random number: Pseudo-random function, but there may actually be rules, and the protocol is not safe if the rules are cracked

Counters: Protocol incomplete (or attack) causing inconsistencies Random challenges received from third parties: How to get? Is the network robust/reliable?

Challenge/Response Protocol:

The authenticator sends a challenge (random number) <-----> The authenticated party sends an authentication block (including the challenge random number)

05ec202046064fa5b6b704f9f5907f15.jpg

 Password generator:

The login interface provides a random number

Enter the random number and PIN into the password generator to get

to login password

type login password

32be3ff8d82143f6acc100342c3864f4.jpg

 IFF Agreement (Identify Friend or Foe): Radar to War

The aircraft sends out a challenge, and the fighter must respond with a correct answer, otherwise it will

considered an enemy aircraft.

 

 

 

Guess you like

Origin blog.csdn.net/2301_77069887/article/details/131350435