Cossack Labs / Why we need novel authentication schemes? 26 Nov 2015

Seth Kontny
Mar 15, 2016 · 8 min read

Introduction: a word to pass

Communication as main threat to secrets

Existing methods of authentication

Custom hash exchange protocols

HTTP authentication

Kerberos

SSL/TLS

OAuth

Rising complexity, problems arise.

Solution?


Cyber Security

Intrusions, injections, impersonations, persona capture depletion

Seth Kontny

Written by

Cyber Security

Intrusions, injections, impersonations, persona capture depletion