22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

220 Lotus Security Handbook<br />

Figure 6-14 Authentication process in Notes and Domino<br />

The numbered steps in the diagram are described as follows:<br />

7. The server generates a random number and a session key and encrypts both<br />

with Fred's public key.<br />

8. The server sends the encrypted random number to Fred.<br />

9. Fred receives the challenge and decrypts it with his private key.<br />

10.Fred sends back the decrypted number to the server.<br />

11.The server compares Fred's response to the original random number.<br />

12.If the result is the same as the original random number, the server can trust<br />

that Fred really is who he claims to be.<br />

As with validation, authentication is also a two-way procedure. Fred now<br />

authenticates the server using the same challenge/response process, but this<br />

time, in reverse.<br />

The actual algorithm is complex but efficient. It avoids any RSA operations on<br />

subsequent authentications between the same client-server pair. It also<br />

establishes a session key that can be used to optimally encrypt the messages<br />

that follow authentication.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!