Data Protection and Security

   

VII

Identification and Entity Authentication

   

VII.III

Authentication Protocols

   

   
 

In the previous section, we have seen that transmission of cleartext password poses eavesdropping risks and a common attack is “listen to the channel, steal the password and replay it later”. Even without using any hardware, there are many solutions of this basic problem including:

  • One-time passwords (OTPs)
  • Challenge-Response Authentication Protocols
  • SSH
  • Mediated Authentication
  • And more...

In this section, we will briefly explain these more advanced authentication protocols.

   

   
       
 
«previous session [1] [2] [3] [4] [5] [6] [7] [8] [9] next session »
   
       
 
«proceed to previous sectionproceed to next section »
  chapter index