Submit Search
Upload
Challenge Response Authentication
•
Download as PPT, PDF
•
0 likes
•
777 views
A
AzaharulIslamAsik
Follow
Challenge Response Authentication by Azaharul Islam Asik
Read less
Read more
Education
Report
Share
Report
Share
1 of 15
Download now
Recommended
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key Cipher
Mahbubur Rahman
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
block ciphers
block ciphers
Asad Ali
Secure electronic transaction ppt
Secure electronic transaction ppt
Subhash Gupta
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
Jayanth Dwijesh H P
Diffie Hellman Key Exchange
Diffie Hellman Key Exchange
SAURABHDHAGE6
Cryptography.ppt
Cryptography.ppt
Uday Meena
MD5 ALGORITHM.pptx
MD5 ALGORITHM.pptx
Rajapriya82
Recommended
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key Cipher
Mahbubur Rahman
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
block ciphers
block ciphers
Asad Ali
Secure electronic transaction ppt
Secure electronic transaction ppt
Subhash Gupta
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
Jayanth Dwijesh H P
Diffie Hellman Key Exchange
Diffie Hellman Key Exchange
SAURABHDHAGE6
Cryptography.ppt
Cryptography.ppt
Uday Meena
MD5 ALGORITHM.pptx
MD5 ALGORITHM.pptx
Rajapriya82
MACs based on Hash Functions, MACs based on Block Ciphers
MACs based on Hash Functions, MACs based on Block Ciphers
Maitree Patel
Steganography
Steganography
Uttam Jain
What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption Standards
Faisal Shahzad Khan
Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
Encryption ppt
Encryption ppt
Anil Neupane
Key Management and Distribution
Key Management and Distribution
Syed Bahadur Shah
public key infrastructure
public key infrastructure
vimal kumar
x.509-Directory Authentication Service
x.509-Directory Authentication Service
Swathy T
Cryptography & Steganography
Cryptography & Steganography
Animesh Shaw
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
Adarsh Patel
Aes
Aes
Muhammad Asif
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
Elliptic Curve Cryptography
Elliptic Curve Cryptography
Adri Jovin
Digital certificates
Digital certificates
Buddhika Karunanayaka
Ch02...1
Ch02...1
nathanurag
Cryptography
Cryptography
Deepak Kumar
symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
Introduction to Cryptography
Introduction to Cryptography
Seema Goel
2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
Network security - OSI Security Architecture
Network security - OSI Security Architecture
BharathiKrishna6
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
UnboundStockton
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
More Related Content
What's hot
MACs based on Hash Functions, MACs based on Block Ciphers
MACs based on Hash Functions, MACs based on Block Ciphers
Maitree Patel
Steganography
Steganography
Uttam Jain
What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption Standards
Faisal Shahzad Khan
Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
Encryption ppt
Encryption ppt
Anil Neupane
Key Management and Distribution
Key Management and Distribution
Syed Bahadur Shah
public key infrastructure
public key infrastructure
vimal kumar
x.509-Directory Authentication Service
x.509-Directory Authentication Service
Swathy T
Cryptography & Steganography
Cryptography & Steganography
Animesh Shaw
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
Adarsh Patel
Aes
Aes
Muhammad Asif
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
Elliptic Curve Cryptography
Elliptic Curve Cryptography
Adri Jovin
Digital certificates
Digital certificates
Buddhika Karunanayaka
Ch02...1
Ch02...1
nathanurag
Cryptography
Cryptography
Deepak Kumar
symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
Introduction to Cryptography
Introduction to Cryptography
Seema Goel
2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
Network security - OSI Security Architecture
Network security - OSI Security Architecture
BharathiKrishna6
What's hot
(20)
MACs based on Hash Functions, MACs based on Block Ciphers
MACs based on Hash Functions, MACs based on Block Ciphers
Steganography
Steganography
What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption Standards
Data Encryption Standard (DES)
Data Encryption Standard (DES)
Encryption ppt
Encryption ppt
Key Management and Distribution
Key Management and Distribution
public key infrastructure
public key infrastructure
x.509-Directory Authentication Service
x.509-Directory Authentication Service
Cryptography & Steganography
Cryptography & Steganography
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
Aes
Aes
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
Elliptic Curve Cryptography
Elliptic Curve Cryptography
Digital certificates
Digital certificates
Ch02...1
Ch02...1
Cryptography
Cryptography
symmetric key encryption algorithms
symmetric key encryption algorithms
Introduction to Cryptography
Introduction to Cryptography
2. public key cryptography and RSA
2. public key cryptography and RSA
Network security - OSI Security Architecture
Network security - OSI Security Architecture
Recently uploaded
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
UnboundStockton
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
KarinaGenton
mini mental status format.docx
mini mental status format.docx
PoojaSen20
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
Celine George
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Celine George
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
VS Mahajan Coaching Centre
MENTAL STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
PoojaSen20
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
Chameera Dedduwage
microwave assisted reaction. General introduction
microwave assisted reaction. General introduction
Maksud Ahmed
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
9953056974 Low Rate Call Girls In Saket, Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
pboyjonauth
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
OH TEIK BIN
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology ( Production , Purification , and Application )
Sakshi Ghasle
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
iammrhaywood
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Sumit Tiwari
Recently uploaded
(20)
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
mini mental status format.docx
mini mental status format.docx
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
MENTAL STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
microwave assisted reaction. General introduction
microwave assisted reaction. General introduction
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology ( Production , Purification , and Application )
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Challenge Response Authentication
1.
2.
My topics is
Challenge Response Authentication
3.
Topics to be
covered • Definition • Ways of Authentication • Summery of the topics
4.
Definition The claimant proves
that she knows a secret without revealing it.
5.
Ways of Authentication •
Using a Symmetric-Key Cipher • Using Keyed-Hash Functions • Using an Asymmetric-Key Cipher • Using Digital Signature
6.
Using a Symmetric-Key
Cipher These also happened in two stages i. authentication using a nonce ii. authentication using a timestamp.
7.
Fig: Challenge response
authentication using a nonce Using a nonce
8.
Fig: Challenge-response authentication
using a timestamp. Using a timestamp
9.
Using Keyed-Hash Functions Fig:
Challenge-response using a keyed-hash function
10.
There are two
advantages to this scheme i. Encryption/decryption algorithm is not exportable to some countries. ii. We can preserve the integrity of challenge and response messages
11.
Using an Asymmetric-Key
Cipher Fig: Challenge-response using an Asymmetric-Key Cipher
12.
Using Digital Signature Fig:
Challenge-response using Digital Signature.
13.
Remember these again •
Ways of Challenge Response Authentication
14.
Any Questions? justianasik@gmail.com
15.
Thanks for being with
Me
Download now