Entity Authentication
Entity Authentication
Entity Authentication
INTRODUCTION
Something known
Something possessed
Something inherent
PASSWORDS
First Approach
User ID and password file
Second Approach
Note
The challenge is a time-varying value sent by the
verifier; the response is the result
of a function applied on the challenge.
Using a Symmetric-Key Cipher
Nonce challenge
Timestamp challenge
Keyed-hash function
Using an Asymmetric-Key Cipher
First Approach
Bidirectional, asymmetric-key
Bob is authenticated.
Alice authenticated.
Using Digital Signature
Claimant uses private key for signing.
First Approach
Digital signature, unidirectional
Second Approach
Digital signature, bidirectional authentication
Authentication protocols
1. Give me EB Directory
4. Give me EA
5. Certified EA
2. Certified EB
3. EB (A, RA)
Alice
Bob
6. EA (RA, RB , KS)
7. KS (RB)
BIOMETRICS
Verification
Identification
Techniques
Techniques
Physiological Techniques
Fingerprint Hands
Iris Voice
Retina DNA
Face
Behavioral Techniques
Signature
Keystroke
Applications