L5: Distributed Password model

Materials

Use the raw slides (pdf) before lecture to take notes and refer to the annotated slides after lecture.

Distributed Passwords

  • How does U2F work? How does it stop phishing?
  • Building auth systems, details of PAM
  • Authenticating to a system with many client and many verifiers
  • Toy examples and how they can fail
  • Reducing number of shared keys required by using a KDC
  • Needham-Schroeder 1978, and its fix
  • Other examples: Kerberos, single-signon, oauth2