Syllabus
Protocols for identification and login: Interactive protocols, Password protocols, Challenge-response protocols, Schnorr’s identification protocol, zero-knowledge protocol. encryption-based protocol and its attacks, Perfect forward secrecy, Protocol based on ephemeral encryption, Attacks on insecure variations- Downgrade attack, Identity protection, One-sided authenticated key exchange, Security of authenticated key exchange protocols, Authenticated Key Exchange/PAKE. Key exchange protocol with trusted third party, Conference Key Protocols, Key Broadcasting Protocols, Federated Identity/SSO.