Authentication Systems

Description

Mind Map on Authentication Systems, created by Davide Cometa on 18/11/2017.
Davide Cometa
Mind Map by Davide Cometa, updated more than 1 year ago
Davide Cometa
Created by Davide Cometa over 6 years ago
30
0

Resource summary

Authentication Systems

Annotations:

  • Authentication of a human, a software or an hardware system against a relaying party.
  1. Authentication mechanisms based on
    1. Knowledge
      1. Ownership
        1. Inherence
          1. Different mechanism of authentication can be combined to obtain higher levels of authentication

            Annotations:

            • Multi-factor authN: more factors are combined (do not use the same factor twice e.g. two passwords).
            1. One-factor authN
              1. Two-factor authN
                1. Three-factor authN
              2. Password-based Authentication
                1. One problem is the storage of the password on the server side
                  1. in clear -> anyone can access it
                    1. encrypted -> the key should be saved
                      1. Hashed -> unprotected digests are subject to dictionary attacks
                        1. Hashed with salt -> unpredictable digests are stored. Dictionary attacks and rainbow tables are made impossible
                      2. Challenge-Response Authentication
                        1. Symmetric CRA
                          1. Asymmetric CRA
                          2. One-time password Authentication

                            Annotations:

                            • a simple authentication technique where the password is used only once as authentication information to verify the identity
                            1. Synchronous

                              Annotations:

                              • password depends on time
                              1. RSA SecurID

                                Annotations:

                                • It is a proprietary solution intrinsically connected with the producer.
                              2. Asynchronous
                                1. S/KEY
                                2. Event-based OTP
                                  1. OOB OTP

                                    Annotations:

                                    • A sort of Password-based authN that increments security by using an out of band OTP exchange (SMS, PSTN are deprecated)
                                    1. Different solutions that are not interoperetable is not good. A common standard has been developed
                                      1. OATH
                                        1. HMAC OTP
                                          1. TOTP
                                            1. OCRA
                                              1. PSKC
                                                1. DSKPP
                                            2. Biometric Authentication
                                              1. Captcha
                                                1. Biometric Techniques
                                                  1. API/SPI standardized by CDSA
                                                    1. FIDO
                                                  2. Zero Knowledge Password Proof
                                                    1. SSO - Single Sign-On
                                                      1. Fictious

                                                        Annotations:

                                                        • Different services require different authentication passwords that are provided by a manager that asks for a global password (like the password wallet, that automatically manages pwds and authNs).
                                                        1. Integral
                                                          1. Multi-application

                                                            Annotations:

                                                            • asymmetric challenge-response systems. All the services are able to recognize the same user credential.
                                                            1. Kerberos
                                                            2. Multi-domain

                                                              Annotations:

                                                              • A service accepts the credential of a service in another domain (like the access with google account on different websites).
                                                          Show full summary Hide full summary

                                                          Similar

                                                          Shapes of molecules and intermolecular forces
                                                          eimearkelly3
                                                          Cell Structure
                                                          daniel.praecox
                                                          BIOLOGY B1 4
                                                          x_clairey_x
                                                          GCSE Computing - 4 - Representation of data in computer systems
                                                          lilymate
                                                          BELIEVING IN GOD- UNIT 1, SECTION 1- RELIGIOUS STUDIES GCSE EDEXCEL
                                                          Khadijah Mohammed
                                                          MATTERS OF LIFE AND DEATH - UNIT 1, SECTION 2 - RELIGIOUS STUDIES GCSE EDEXCEL
                                                          Khadijah Mohammed
                                                          F211- Module 1 Cells, exchange and transport
                                                          eilish.waite
                                                          GCSE Biology B2 (OCR)
                                                          Usman Rauf
                                                          Key policies and organisations Cold War
                                                          E A
                                                          Macbeth Essay Notes
                                                          Mel M
                                                          Cloud Data Integration Specialist Certification
                                                          James McLean