Authentication Systems

Description

Mind Map on Authentication Systems, created by Davide Cometa on 18/11/2017.
Davide Cometa
Mind Map by Davide Cometa, updated more than 1 year ago
Davide Cometa
Created by Davide Cometa over 6 years ago
30
0

Resource summary

Authentication Systems

Annotations:

  • Authentication of a human, a software or an hardware system against a relaying party.
  1. Authentication mechanisms based on
    1. Knowledge
      1. Ownership
        1. Inherence
          1. Different mechanism of authentication can be combined to obtain higher levels of authentication

            Annotations:

            • Multi-factor authN: more factors are combined (do not use the same factor twice e.g. two passwords).
            1. One-factor authN
              1. Two-factor authN
                1. Three-factor authN
              2. Password-based Authentication
                1. One problem is the storage of the password on the server side
                  1. in clear -> anyone can access it
                    1. encrypted -> the key should be saved
                      1. Hashed -> unprotected digests are subject to dictionary attacks
                        1. Hashed with salt -> unpredictable digests are stored. Dictionary attacks and rainbow tables are made impossible
                      2. Challenge-Response Authentication
                        1. Symmetric CRA
                          1. Asymmetric CRA
                          2. One-time password Authentication

                            Annotations:

                            • a simple authentication technique where the password is used only once as authentication information to verify the identity
                            1. Synchronous

                              Annotations:

                              • password depends on time
                              1. RSA SecurID

                                Annotations:

                                • It is a proprietary solution intrinsically connected with the producer.
                              2. Asynchronous
                                1. S/KEY
                                2. Event-based OTP
                                  1. OOB OTP

                                    Annotations:

                                    • A sort of Password-based authN that increments security by using an out of band OTP exchange (SMS, PSTN are deprecated)
                                    1. Different solutions that are not interoperetable is not good. A common standard has been developed
                                      1. OATH
                                        1. HMAC OTP
                                          1. TOTP
                                            1. OCRA
                                              1. PSKC
                                                1. DSKPP
                                            2. Biometric Authentication
                                              1. Captcha
                                                1. Biometric Techniques
                                                  1. API/SPI standardized by CDSA
                                                    1. FIDO
                                                  2. Zero Knowledge Password Proof
                                                    1. SSO - Single Sign-On
                                                      1. Fictious

                                                        Annotations:

                                                        • Different services require different authentication passwords that are provided by a manager that asks for a global password (like the password wallet, that automatically manages pwds and authNs).
                                                        1. Integral
                                                          1. Multi-application

                                                            Annotations:

                                                            • asymmetric challenge-response systems. All the services are able to recognize the same user credential.
                                                            1. Kerberos
                                                            2. Multi-domain

                                                              Annotations:

                                                              • A service accepts the credential of a service in another domain (like the access with google account on different websites).
                                                          Show full summary Hide full summary

                                                          Similar

                                                          Question Words - GCSE German
                                                          lucykatewarman1227
                                                          Essay Writing: My Essay Plan
                                                          Andrea Leyden
                                                          One child policy, China- Population Control Case Study
                                                          a a
                                                          Matters of Life and Death GCSE
                                                          kate.siena
                                                          ICT Revision 2014
                                                          11RaceyG
                                                          Chemistry Regents - Bonding Theories and Polar Bonds Notes
                                                          Ali Kane
                                                          Prática para o TOEFL
                                                          miminoma
                                                          Cell Organelles and Functions
                                                          Melinda Colby
                                                          GoConqr Quick Guide to Getting Started
                                                          Andrea Leyden
                                                          Chinese HSK -1 Characters Flashcards
                                                          ASHISH AWALGAONKAR
                                                          Power and Conflict Poetry
                                                          Charlotte Woodward