Authentication, identity and digital signatures protocols and technologies

Authentication, identity and digital signatures protocols and technologies

This module describes the main authentication protocols and technologies commonly used in the context of network authentication. The module also aims to explore the concept of digital signatures in greater depth, with particular reference to the technical specifications for qualified electronic signatures and the associated security aspects. 

Would you like to attend the course live with the tutor? Download the course timetable and get in touch

Would you like to take the course via e-learning, available 24/7? Register on the platform

Topics

PART 1 (Peer-Entity Authentication e Digital Identity): Authentication protocols (password, Lamport, EKE, challenge-response, ZKP, etc.). Multi-factor authentication. Biometric authentication. FIDO and FIDO2 standards. Protocols and technologies for federated digital identity and SSI-based systems.

PART 2 (Electronic Signatures): Cryptographic primitive for digital signatures. Electronic signatures and digital documents. Certificates, revocation, X.509 PKI. Advanced and qualified electronic signature. Signature formats (CADES, PADES, XADES, ASIC-S). Vulnerability. Qualified timestamp. Qualified signature device. Remote signature.

Target

  • BUSINESSES AND PUBLIC ADMINISTRATION, particularly those within the scope of the project IT. Master’s and PhD students
  • CORPORATE AND PUBLIC SECTOR IT STAFF
  • MASTER’S AND PHD STUDENTS IN THE IT SECTOR with an interest in cybersecurity or interdisciplinary legal profiles

Course structure

Module 1 - AUTHENTICATION PROTOCOLS
10 hours
  • Basic and advanced password management models
  • Multi-factor authentication (MFA)
  • Google Authenticator, Microsoft Authenticator
  • U2F (Universal 2nd Factor) and physical authentication devices
  • Biometric authentication
Module 2 - FIDO
2 hours

•Key concepts: passwordless authentication, credential protection
•Related technologies: WebAuthn, UAF (Universal Authentication Framework), U2F
•FIDO2 – Improvements over FIDO: support for the WebAuthn protocol and CTAP (Client to Authenticator Protocol)
•Examples of implementation in modern browsers and hardware devices (e.g., YubiKey)

Module 3 - DIGITAL IDENTITY PROTOCOLS AND STANDARDS
10 hours
  • Digital identity and standard protocols (e.g., SAML, OAuth 2.0, OpenID Connect)
  • Principles of decentralised identity
  • Use of blockchain for secure and autonomous identity management
Module 4 - ELECTRONIC SIGNATURES
4 hours
  • Simple electronic signatures (SES), advanced electronic signatures (AES) and qualified electronic signatures (QES)
  • Electronic documents
Module 5 - CERTIFICATES AND PKI FOR ELECTRONIC SIGNATURES
5 hours
  • Digital certificates and CAs
  • Certificate revocation management
Module 6 - SIGNATURE FORMATS
2 hours
  • Standard formats for digital signatures (CADES, PADES, XADES)
  • Comparisons between the formats
  • Use cases and specific advantages of each format
Module 7 - TIMESTAMP
2 hours
  • The importance of timestamping in digital signatures
  • How a Time Stamping Authority (TSA) works
Module 8 - QUALIFIED SIGNATURE DEVICE AND REMOTE SIGNATURE
4 hours

•Regulatory Compliance

WORKSHOP
16 hours

Practical exercise on federated authentication protocols (SAML2 and OpenID Connect) and SSI.

Hands-on sessions for developers on integrating digital identity solutions (SAML SSO, OpenID Connect, OAuth 2.0, WebAuthn).

Authentication, identity and digital signatures protocols and technologies

Index

Request more information

Fill in all sections of the form and click CONFIRM.

You may also be interested in…