Data Protection and Security |
||||||
VII |
Identification and Entity Authentication |
|||||
VII.I |
Introduction |
|||||
There are two types of authentication:
Another major difference between these two is that message authentication itself does not provide any timeliness guarantees whereas entity authentication confirms the identity in real-time while the verifying entity awaits. In security, one of the primary purposes is to facilitate access control to a resource, when an access privilege is linked to a particular identity i.e. local or remote access to computer accounts. This is sometimes called authorization. Most of the time, authorization follows authentication. We have seen authorization in chapter 5. Note that sometimes for authorization, authentication is not used. Instead, a security credential is declared. For example, to get on a bus, you do not need to authenticate yourself, you need to issue the bus ticket to the bus driver for this purpose. Entity authentication or authentication in short is the main topic we will cover in this chapter. There is a difference between the terms Identification and Authentication: Identification: Who are you? In other words, authentication is the process of identity verification. Broadly speaking, entity authentication can be implemented by three different techniques: These techniques sometimes can be used together for improving security. If two of them used together, this is called two-factor authentication. Three-factor authentication is also possible. In multifactor authentication, sometimes the location (Where you are) information is also used as one additional component. Since this fourth technique is rarely used solely for authentication, it is not included in the list above.
|
||||||
VII.I.I Q |
[+] Question
[-] Question
In which applications authentication is a prerequisite for authorization? Why? |
|||||
|
||||||
|
chapter index | |||||