As more users access remote systems, the job of identifying and authenticating those users at distance becomes increasingly difficult. The growing impact of attackers on identification and authentication systems puts additional strain on our ability to ensure that only authorized users obtain access to controlled or critical resources. This course reviews basic cryptology techniques and introduces their application to contemporary authentication methods.
Introduction for Authentication, Crypto Hash Functions for Authentication, Message Authentication Codes, Digital Signature, Trust Models - key management and distribution, User Authentication, Access Control, Wireless Authentication, cloud and IoT authentication.