TKK | Tietoverkkolaboratorio | Opetus
[intro]
[cryptography] [schemes] [protocols] [implementations] [authors] |
Identification in WWW servicesGroup exercise of s-38.118, group one Jussi Ikäheimo & Wenpeng Zhou IntroductionThe importance and popularity of services in the World Wide Web is growing. Services such as possibility to operate one's bank account through the Internet have gained more popularity. This raises the question of security. Could it be possible for someone to illicitly gain access to our bank accounts through the net? The computer cannot see our driver's license, so can the system make sure that access is not given to criminals? How can it be done? On the other hand, how can we know that the computer that receives our commands is really the bank´s computer?The traditional aspects of network security are
For identification to happen, the parties must first provide some identifying information to the system (the web). This is then processed and conveyed in the system. How is this done exactly? There are different schemes of authentication, on which several protocols are based. Real implementations then use the protocols. To understand the ideas, a quick look at cryptography is recommended. ![]() Figure: Also the authentication of a service is important. (Source JI) |
Tietoverkkolaboratorio on nyt osa Tietoliikenne- ja tietoverkkotekniikan laitosta. Tällä sivulla oleva tieto voi olla vanhentunutta.
Kurssien ajantasainen tieto on MyCourses-palvelussa.
Tämä sivu on tehty oppilaiden harjoitustyönä. Tietoverkkolaboratorio ei
vastaa sivun oikeellisuudesta, ajantasaisuudesta tai ylläpidosta.
Vakavissa tapauksissa yhteyshenkilöinä toimivat ja
Webmaster.
Sivua on viimeksi päivitetty 15.11.1999 17:06. URI: http://www.netlab.tkk.fi/opetus/s38118/s99/htyo/1/index.shtml [ TKK > Sähkö- ja tietoliikennetekniikan osasto > Tietoverkkolaboratorio > Opetus ] |