Security in Computer Networks

8.3 Authentication

Home | Introduction | 8.1 What Is Network Security? | 8.2 Principles of Cryptography | 8.3 Authentication | 8.4 Integrity | 8.5 Key Distribution and Certification | 8.6 Access Control: Firewalls | 8.7 Attacks and Countermeasures | 8.8 Security in Many Layers: Case Studies

Authentication is the process of proving on'e identity to someone else.  As humans, we authenticate each other in many ways:  we recognize each other's faces when we meet, we recognize each other's voices on the telephone, we are authenticated by the customs official who checks us against the picture on our passport.
 
Consider how one party can authenticate another party when the two are communicating over a network.
 
When performing authentication over the network, the communicating parties cannot rely on biometric information, such as visual apperance or a voiceprint.
 
Authentication must be done solely on the basis of messages and data excahanged as part of an authentication protocol.

8.3.1 Authentication Protocol ap1.0

8.3.2 Authentication Protocol ap2.0

8.3.3 Authentication Protocol ap3.0

8.3.4 Authentication Protocol ap3.1

8.3.5 Authentication Protocol ap4.0

8.3.6 Authentication Protocol ap5.0