null Global Committee elections are coming up! See the election repository for more information.

Abstract

  1. Here we'll be discussing various authentication mechanisms used by the SSH server to authenticate clients.
    1. A brief introduction about the password based authentication and how it can be broken.
    2. Major focus on Public-Key Cryptography mechanism of authentication in SSH.
    3. Creation of the cryptographic keys.
    4. Configuring the server/client and distributing the keys.

Speaker

Harish Tiwari

Currently working with Payatu Software Labs LLP as a Security Consultant

Timing

Starts at Saturday May 06 2017, 10:45 AM. The sessions runs for 30 minutes.

Resources