6.033 Computer System Engineering

advertisement
MIT OpenCourseWare
http://ocw.mit.edu
6.033 Computer System Engineering
Spring 2009
For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.
1)
2)
3)
Authentication
Authorization
Confidentiality
Sign, Verify
sign(m, k1) = sig
verify(m, sig, k2)
Encrypt, Decrypt
enc(m, k1) Æ c
dec(c, k2) Æ m
Secure Comm. Channel
1)
2)
3)
use pub key to exchange a shared key
use shared key to enc. comm
freshness
appropriateness
forward secrecy
Confidentiality
m
Encrypt
k1
c
cÎm
k2, c Î m
Decrypt
k2
m
Confidentiality + Authentication
sign(encrypt(m, kconf), kauth)
Authenticate
sign(m, kauth)
freshness – (e.g. T)
add timestamp to m
appropriateness
add context
Example: Web
CA
B
secure comm channel
authenticated
confidential
W
Q. How does W
know that B is
authorized to
access W?
(3) Authorization Functions
1)
2)
3)
Rendezvous (setup)
Verification (mediate)
Revoke
Authorization
ACL
access control lists
hard to
guess #
capabilities
Lists
Tickets
Setup
add to list
generate ticket
Mediate
search list,
check credentials
table lookup
Revoke
remove from list
invalidate ticket
Auth
who are you?
Guard
Service
{name, uk}
authNo
ticket
read acct B, ticket
Cookie
user,
timeout
hash(
user,
timeout,
random #)
B
W
tickets
t
resource
authNo
Acct B
Download