Class+Notes7 Authentication
Class+Notes7 Authentication
Authentication is the process of determining whether someone or something is, in fact, who
or what it says it is. Authentication technology provides access control for systems by
checking to see if a user's credentials match the credentials in a database of authorized users
or in a data authentication server. In doing this, authentication assures secure systems, secure
processes and enterprise information security.
C Authenticate
‘A’ as Sender
A B
Types of Authentication
1. Message Encryption
In this type of authentication, the ciphertext has been used as authenticator. It is of four
categories.
Sender send message to receiver by encryption and decryption using single secret key. It
maintains confidentiality and authentication both.
Sender Encryption Decryption Receiver
using Secret Key using Secret Key
Plain Cipher Plain
Text E Text D Text
Sender send message to receiver by encryption using receiver’s public key and decryption
using receiver’s private key. It maintains confidentiality but not maintain authentication.
Sender send message to receiver by encryption using receiver’s public key and decryption
using receiver’s private key. It maintains authentication but not maintain confidentiality.
Sender send message to receiver by encryption using receiver’s public key and decryption
using receiver’s private key. It maintains authentication and confidentiality both.
Decryption Decryption
Encryption Receiver
Sender Encryption using using Public
using Public
using Private Private Key Key of
Key of
Key of Sender of Receiver Sender
Receiver
Cipher Cipher Plain
Plain Cipher D
E E Text2 Text1 D Text
Text Text1
In this type of authentication, the fixed length code (MAC) has been used as authenticator. It
is of three categories. The message authentication code can be defined using function.
i. Sender Receiver
Plain
Plain Text C
Text C + Compared
Key
Key MAC MAC
C denotes a function using the key that generates MAC. At the last a comparison is used for
authenticate the sender.
ii.
Sender Receiver
Plain Plain
Text Text C
Plain
C + E D Compared
Text
Key 1
MAC
Key 1 Key 2 MAC Key 2 MAC
E denotes Encryption process using another key (Key2), this key is different from key of
MAC function. Similarly, D denotes Decryption process using same key (Key2). Similar like
previous category, the last comparison is used for authenticate the sender. The
authentication tied to plain text.
iii.
Sender Receiver
Plain Plain
Text Text C
Plain
C + E D Compared
Text
Key 1
MAC
Key 1 Key 2 MAC Key 2 MAC
3. Hash function
The hash code is used as authenticator. No key used, only hash function is used. H(m) = h. It
is of two categories.
Sender Receiver
h
Plain
Plain Text H
Text H E + Compared
h
Key of h D
private
key of A
Key