Chapter 15
Chapter 15
User Authentication
User Authentication
• The process of verifying an identity claimed by
or for a system entity
• An authentication process consists of two steps:
– Identification: Presenting an identifier to the security
system.
– Verification: generating authentication information
that confirms binding between entity and identifier.
Means of User Authentication
• There are four general means of authenticating a user's identity
1. Something the user knows: Includes a password, a personal identification
number (PIN), or answers to a prearranged set of questions.
2. Something the user possesses: Include electronic keycards, smart cards,
and physical keys. Authenticator type is referred to as a token.
3. Something the user is (static biometrics): Include recognition by
fingerprint, retina, and face.
4. Something the user does (dynamic biometrics): Include recognition by
voice pattern, handwriting characteristics, and typing rhythm.
• Example: E-mail
Sender & Receiver are not in communications at same time.
Requirements
• Header of the email message in clear so that can be
delivered by Store and Froward e-mail protocol
[Simple Mail Transfer Protocol “SMTP”]
• Contents of body protected & sender authenticated
Using Symmetric Encryption