tailieunhanh - Chapter 14: Entity Authentication

Objectives of Chapter 14: To distinguish between message authentication and entity authentication; to define witnesses used for identification; to discuss some methods of entity authentication using a password; to introduce some challenge-response protocols for entity authentication; to introduce some zero-knowledge protocols for entity authentication; to define biometrics and distinguish between physiological and behavioral techniques. | Cryptography and Network Security Jf Chapter 14 Objectives Chapter 14 Entity Authentication To distinguish between message authentication and entity authentication To define witnesses used for identification To discuss some methods of entity authentication using a password To introduce some challenge-response protocols for entity authentication To introduce some zero-knowledge protocols for entity authentication To define biometrics and distinguish between physiological and behavioral techniques 14-1 INTRODUCTION Data-Origin Versus Entity Authentication Entity authentication is a technique designed to let one party prove the identity of another party. An entity can be a person a process a client or a server. The entity whose identity needs to be proved is called the claimant the party that tries to prove the identity of the claimant is called the verifier. Topics discussed in this section Data-Origin Versus Entity Authentication Verification Categories Entity Authentication and Key Management There are two differences between message authentication data-origin authentication discussed in Chapter 13 and entity authentication discussed in this chapter. 1 Message authentication might not happen in real time entity authentication does. 2 Message authentication simply authenticates one message the process needs to be repeated for each new message. Entity authentication authenticates the claimant for the entire duration of a session. Verification Categories Something known Entity Authentication and Key Management This chapter discusses entity authentication. The next chapter discusses key managment. Something possessed Something inherent 1 Fixed Password 14-2 PASSWORDS The simplest and oldest method of entity authentication is the password-based authentication where the password is something that the claimant knows. First Approach Topics discussed in this section Fixed Password One-Time .

TỪ KHÓA LIÊN QUAN