Lecture

Access Control: Password-based Cryptography

In course
DEMO: ullamco consequat
Sunt fugiat duis proident consectetur dolor quis ea quis magna. Commodo aute est laborum dolor irure occaecat et do. Reprehenderit nulla Lorem consectetur irure est enim reprehenderit dolore nostrud mollit. Eiusmod id officia laborum labore reprehenderit laboris irure esse magna aliquip aliquip magna qui. Enim ex velit fugiat quis in consectetur. Nisi occaecat nulla quis sint labore amet labore sit. Dolor excepteur nisi id sunt occaecat.
Login to see this section
Description

This lecture covers access control and password-based cryptography, focusing on protocols like Challenge/Response Protocol and Password Authentication Protocol. It also discusses the challenges of password access control, the human factor, and alternate authentication means such as biometrics. A case study on the biometric passport is presented, detailing the objectives of Machine Readable Travel Documents (MRTD) and the security features like biometrics and contactless IC chips. The lecture concludes with examples of existing protocols in password-based cryptography and the history of MRTD development.

Instructor
occaecat in
Nulla laboris esse eiusmod aliqua id ad ex labore do laborum cupidatat in. Consectetur dolore eu elit et ex aute aute duis. Veniam sint enim anim esse. Commodo nisi culpa aliqua sunt amet nulla. Ut sunt ipsum sit magna incididunt veniam officia voluptate anim. Ipsum minim laboris minim aliquip minim. Ullamco enim culpa dolore tempor veniam occaecat cillum elit quis magna in sint.
Login to see this section
About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Related lectures (61)
Access Control Policies: Authentication and Authorization
Explores access control policies, authentication methods, and the principles of least privilege, emphasizing the importance of secure and user-friendly authentication protocols.
Password Security
Emphasizes the importance of safeguarding passwords and avoiding sharing them.
Information Security: Communication, Calculation, Threats
Explores information security in communication, calculation, and digital threats, emphasizing data protection and access control.
Trust Establishment: Cryptography and Security
Explores trust establishment in cryptography and security, covering secure channels, PKI vulnerabilities, and diverse cryptographic models.
Data Security: Hashing, Salting, and Password Storage
Emphasizes the significance of hashing, salting, and secure password storage in data security, highlighting the use of salt to prevent dictionary attacks and memory hard functions to slow down password cracking.
Show more

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.