News
Session 3 - LinkWritten on 15.09.23 by Lucjan Hanzlik https://cispa-de.zoom-x.de/j/65087275646?pwd=Ry9MYnF0Z1lBSUpBL0dCTjVIcURYdz09 |
Topic AssignmentWritten on 11.05.23 (last change on 13.09.23) by Lucjan Hanzlik Dear All, You can find the topic assignment in the material section on the CMS website. For those that want to attend the seminar with the topic assigned, I would like to ask Dear All, You can find the topic assignment in the material section on the CMS website. For those that want to attend the seminar with the topic assigned, I would like to ask Best, Lucjan Hanzlik |
Topic preferenceWritten on 30.04.23 by Lucjan Hanzlik Dear All, As mentioned during the kick-off meeting, I added some materials to each topic, but I encourage you to look also
Regarding the topic preferences, I would like you to send me an email with your preference list in the following… Read more Dear All, As mentioned during the kick-off meeting, I added some materials to each topic, but I encourage you to look also
Regarding the topic preferences, I would like you to send me an email with your preference list in the following form: 12, 4, 5, 6, 2, 3, 9, 10, 11, 7, 8, 1 This list assigns each topic a value from 1 to 12, where 12 is the points you should give to the topic you like the most. |
Cryptographic Authentication
Authentication systems are crucial components in almost all areas of the digital world. They provide means for secure access control, privacy protection, and building trust between remote devices. We use those systems daily to log in to access emails, banking, and social media accounts, and even to access our smartphones and computers. We can authenticate ourselves remotely using modern electronic identification documents (eID), allowing us to use eGovernment services. We are often unaware that those systems are executed in the background between machines.
In this seminar, we will look at the cryptography behind authentication systems. Topics covered will include basic challenge-response authentication protocols, deniable authentication based on Diffie-Hellman key exchange, and authentication of eIDs and ePassports. We will also discuss privacy-preserving authentication mechanisms like group/ring signatures, anonymous credentials, and Privacy Pass.
Logistics
- 3 days block course with 4 hour-long meetings, time and date (13.09, 14.09, 15.09 at 10:00)
Venue
- Zoom
Topics
- Password-based authentication (techniques, best practices, advantages, disadvantages, attacks - real-world examples) Materials [1, 2, 3]
- Authentication via challenge-response (protocol design, at are signature schemes, examples, certificates) Materials [1, 2, 3]
- WebAuthn & Fast IDentity Online FIDO (protocol design, (non)-resident keys, key-wrapping, attacks) Materials [1, 2, 3]
- Authenticate Key Exchange AKE protocols (what are AKE protocols, example schemes, deniable authentication) Materials [1, 2, 3]
- Password Authenticated Key Exchange PAKE protocol (what are PAKE protocols, example schemes, asymmetric PAKE) Materials [1, 2, 3]
- TLS Authentication (what is TLS handshake, how does it work, what crypto is used) Materials [1, 2, 3]
- Anonymous authentications (what is it, examples, pros and cons) Materials [1, 2, 3]
- Remote attestation in TPM (why is it useful, what can we authenticate, privacy CA, direct anonymous attestation DAA) Materials [1, 2, 3]
- Group signatures and ring signatures (how to build, what are they useful for, different versions, cryptocurrencies) Materials [1, 2, 3]
- Cryptography in ICAO-based ePassports (basic access control, Copacobana attack, PACE, CA, TA) Materials [1, 2, 3]
- Cryptography in German eID (online authentication using eID, restricted identification, pseudonymous signatures) Materials [1, 2, 3]
- Privacy Pass and Private Access Tokens PAT (what are they used for, how do they work, PAT in Apple devices) Materials [1, 2, 3]