Electronics Home»Top Flaws in Distributed Authentication Systems and how they are Attacked, High Tech, Page 50

Top Flaws in Distributed Authentication Systems and how they are Attacked, High Tech, Page 50

Top Flaws in Distributed Authentication Systems and how they are Attacked

Share  Email
  Page: 50
See entire paper: http://electronics.wesrch.com/pdfEL11TZ3XNMONP
Page URL: http://electronics.wesrch.com/50-pdfEL11TZ3XNMONP
Note : Best viewed in FF3 or above, IE7 or above
Page(s): 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64
 
Page content:

Canonicalize as little as necessary
 Extreme C14N is often a layering violation.

 Cryptographic primitives can provide confidentiality,
guarantee authenticity, bind together the parts of a
message and serve in producing random numbers

 Ensuring that every well-formed message has
an unambiguous meaning is the responsibility
of the protocol or message layer, not of the
cryptographic primitive.
 The elements of the crypto protocol itself may require careful
treatment to avoid type flaws.

 But the payload should be opaque.

Insert presenter logo
here on slide master.
See hidden slide 2 for
directions