This demonstration presents multiple scenarios of the authentication by challenge-response-methods with symmetric and asymmetric cryptography. You play a role as an attacker and by some actions you can intercept the network traffic between client and server, interrupt and transmit sham news between the two. So you are among other things in a position to carry out a man-in-the-middle-attack.
Descriptions for operation and the different scenarios can be found in the following pages. The scenario descriptions can also be directly activated from each scenario. Before you read the solutions you have to cope with the assigned tasks. Furthermore, the indicated solutions are only exemplary, for certain scenarios other solutions are possible.
Dialog Challenge-Response-Demonstration
Scenario 1: Password (problem description
/ solution)
Scenario 2: One-Time-Passowords (problem
description / solution)
Scenario 3: Challenge-Response (symmetric) (problem
description / solution)
Scenario 4: Challenge-Response (asymmetric) (problem
description / solution)
Scenario 5: Mutual Authentification (problem
description / solution)
Man-in-the-middle-attack