Files
billbuchanan 3220114a29 Update
2025-04-28 06:29:17 +01:00
..
2025-01-27 19:50:40 +00:00
2025-04-28 06:29:17 +01:00
2021-01-18 20:47:18 +00:00
2025-04-28 06:29:17 +01:00
2021-01-18 20:47:18 +00:00

esecurity

Investigation of Tokens, Authorization and Docker

The key concepts are:

  • Token creation and usage, including JWT, Fernet, OAuth and ERC20.
  • Federated ID systems.
  • Outline of the usage of Docker for building security infrastructure for SSH and authorization.

What you should know at the end of unit?

  • Define how ERC-20 tokens are used within Ethereum.
  • Understand the scope of tokens and how they could be used for authorization.
  • Define the signing methods used in tokens, such as with HMAC and RSA, and the weakness of token which are not signed (OAuth)
  • Able to setup a simple Docker container which implements a security function.

Material

  • Week 10 Lecture (Video): here.
  • Week 10 Lecture (PDF): here
  • Week 10 Lab (PDF): here.

The following are some related presentations:

  • JSON Web Tokens: here.
  • Fernet Tokens: here.
  • Fernet Tokens (with PBKDF2): here.
  • Fernet Tokens (with Key rotation): here.
  • Fernet Tokens (Autokeying): here.