Data Protection and Security

   

VII

Identification and Entity Authentication

   

VII.VI

Summary

   

   
 

One of the essential security services is authentication. In this chapter, we first explore password-based authentication and see its drawbacks in section 2. More sophisticated authentication protocols ranging from one-time password schemes to mediated authentication are the topics of section 3. Until this point, the discussion is on software authentication in which no specialized hardware is employed. Section 4 summarizes two alternatives to passwords when this piece of hardware is available. Biometric authentication is based on recognizing humans with their unique characteristics using a reading hardware. A smartcard is an embedded device that contains microprocessor and memory holding secret data providing security services including authentication. Finally in section 5, we bring phishing attacks to the table as a case study to understand the reasons of difficulty for providing secure authentication.

 

   

QUIZ

Identification and Entity Authentication

   

   
       
 
«previous session [1]  
   
       
 
«proceed to previous section  
  chapter index