0% found this document useful (0 votes)
31 views4 pages

Class+Notes7 Authentication

Uploaded by

k5c6hdvmq7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views4 pages

Class+Notes7 Authentication

Uploaded by

k5c6hdvmq7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Authentication

Authentication is the process of determining whether someone or something is, in fact, who
or what it says it is. Authentication technology provides access control for systems by
checking to see if a user's credentials match the credentials in a database of authorized users
or in a data authentication server. In doing this, authentication assures secure systems, secure
processes and enterprise information security.

Why is authentication important in Cybersecurity?

Authentication enables organizations to keep their networks secure by permitting only


authenticated users or processes to gain access to their protected resources. This may include
computer systems, networks, databases, websites and other network-based applications or
services.

Once authenticated, a user or process is usually subjected to an authorization process to


determine whether the authenticated entity should be permitted access to a specific protected
resource or system. A user can be authenticated but not be given access to a specific resource
if that user was not granted permission to access it.

C Authenticate
‘A’ as Sender

A B

Types of Authentication
1. Message Encryption

In this type of authentication, the ciphertext has been used as authenticator. It is of four
categories.

Message encryption using Symmetric key cryptography:

Sender send message to receiver by encryption and decryption using single secret key. It
maintains confidentiality and authentication both.
Sender Encryption Decryption Receiver
using Secret Key using Secret Key
Plain Cipher Plain
Text E Text D Text

Message encryption using Asymmetric key cryptography:

Sender send message to receiver by encryption using receiver’s public key and decryption
using receiver’s private key. It maintains confidentiality but not maintain authentication.

Sender Encryption Decryption Receiver


using Public Key using Private
of Receiver Key of Receiver

Plain Cipher Plain


Text E Text D Text

Sender send message to receiver by encryption using receiver’s public key and decryption
using receiver’s private key. It maintains authentication but not maintain confidentiality.

Sender Encryption Decryption Receiver


using Private using Public Key
Key of Sender of Sender

Plain Cipher Plain


Text E Text D Text

Sender send message to receiver by encryption using receiver’s public key and decryption
using receiver’s private key. It maintains authentication and confidentiality both.
Decryption Decryption
Encryption Receiver
Sender Encryption using using Public
using Public
using Private Private Key Key of
Key of
Key of Sender of Receiver Sender
Receiver
Cipher Cipher Plain
Plain Cipher D
E E Text2 Text1 D Text
Text Text1

2. Message Authentication Code

In this type of authentication, the fixed length code (MAC) has been used as authenticator. It
is of three categories. The message authentication code can be defined using function.
i. Sender Receiver

Plain
Plain Text C

Text C + Compared
Key
Key MAC MAC

C denotes a function using the key that generates MAC. At the last a comparison is used for
authenticate the sender.

ii.
Sender Receiver

Plain Plain
Text Text C
Plain
C + E D Compared
Text
Key 1
MAC
Key 1 Key 2 MAC Key 2 MAC

E denotes Encryption process using another key (Key2), this key is different from key of
MAC function. Similarly, D denotes Decryption process using same key (Key2). Similar like
previous category, the last comparison is used for authenticate the sender. The
authentication tied to plain text.

iii.

Sender Receiver

Plain Plain
Text Text C
Plain
C + E D Compared
Text
Key 1
MAC
Key 1 Key 2 MAC Key 2 MAC

Here, the authentication tied to cipher text.

3. Hash function
The hash code is used as authenticator. No key used, only hash function is used. H(m) = h. It
is of two categories.
Sender Receiver
h
Plain
Plain Text H
Text H E + Compared
h
Key of h D
private
key of A

Key

i. H denotes hash function.


Sender
Receive
r
Ciph Plai
Plain er n H
Text H E + D
Text D Text Compare
h d
h h D
Key of Secret
private
Key
key of A Secret
key Key of public
key of A

You might also like