ITIS 3200 Lecture Notes - Lecture 2: Nt Lan Manager, Plaintext, Phishing

40 views4 pages

Document Summary

Seeks to confirm that an entity is who he/she/it claims to be. Methods to authenticate should be reliable and authentication methods (password, pin, etc) should be private. Real life example: i"m dan *dan shows his id* Biometrics (face, fingerprint, voice, retinal: what you have. Physical key, passport, security token: you use a combination of these to increase security. The cryptographic hash value of the password is stored. X y , we can check this. But if you know y, you cannot find x. (y x) When you enter you pw, the computer hashes it and compares it to the hash already stored on the computer. Lm (windows xp) or ntlm (the newer versions of windows) Precomputed table of computed passwords in hash values. They can then match the hash and know what your password is. A random value (string) added to the password.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents