Authentication Systems

Beschreibung

Mindmap am Authentication Systems, erstellt von Davide Cometa am 18/11/2017.
Davide Cometa
Mindmap von Davide Cometa, aktualisiert more than 1 year ago
Davide Cometa
Erstellt von Davide Cometa vor etwa 7 Jahre
33
0

Zusammenfassung der Ressource

Authentication Systems

Anmerkungen:

  • Authentication of a human, a software or an hardware system against a relaying party.
  1. Authentication mechanisms based on
    1. Knowledge
      1. Ownership
        1. Inherence
          1. Different mechanism of authentication can be combined to obtain higher levels of authentication

            Anmerkungen:

            • Multi-factor authN: more factors are combined (do not use the same factor twice e.g. two passwords).
            1. One-factor authN
              1. Two-factor authN
                1. Three-factor authN
              2. Password-based Authentication
                1. One problem is the storage of the password on the server side
                  1. in clear -> anyone can access it
                    1. encrypted -> the key should be saved
                      1. Hashed -> unprotected digests are subject to dictionary attacks
                        1. Hashed with salt -> unpredictable digests are stored. Dictionary attacks and rainbow tables are made impossible
                      2. Challenge-Response Authentication
                        1. Symmetric CRA
                          1. Asymmetric CRA
                          2. One-time password Authentication

                            Anmerkungen:

                            • a simple authentication technique where the password is used only once as authentication information to verify the identity
                            1. Synchronous

                              Anmerkungen:

                              • password depends on time
                              1. RSA SecurID

                                Anmerkungen:

                                • It is a proprietary solution intrinsically connected with the producer.
                              2. Asynchronous
                                1. S/KEY
                                2. Event-based OTP
                                  1. OOB OTP

                                    Anmerkungen:

                                    • A sort of Password-based authN that increments security by using an out of band OTP exchange (SMS, PSTN are deprecated)
                                    1. Different solutions that are not interoperetable is not good. A common standard has been developed
                                      1. OATH
                                        1. HMAC OTP
                                          1. TOTP
                                            1. OCRA
                                              1. PSKC
                                                1. DSKPP
                                            2. Biometric Authentication
                                              1. Captcha
                                                1. Biometric Techniques
                                                  1. API/SPI standardized by CDSA
                                                    1. FIDO
                                                  2. Zero Knowledge Password Proof
                                                    1. SSO - Single Sign-On
                                                      1. Fictious

                                                        Anmerkungen:

                                                        • Different services require different authentication passwords that are provided by a manager that asks for a global password (like the password wallet, that automatically manages pwds and authNs).
                                                        1. Integral
                                                          1. Multi-application

                                                            Anmerkungen:

                                                            • asymmetric challenge-response systems. All the services are able to recognize the same user credential.
                                                            1. Kerberos
                                                            2. Multi-domain

                                                              Anmerkungen:

                                                              • A service accepts the credential of a service in another domain (like the access with google account on different websites).
                                                          Zusammenfassung anzeigen Zusammenfassung ausblenden

                                                          ähnlicher Inhalt

                                                          Stimmungen in Englisch lernen
                                                          Michelle Eichinger
                                                          IKA-Theoriefragen Serie 19 (15 Fragen)
                                                          IKA ON ICT GmbH
                                                          AOW - Psych
                                                          Aydan Altuner
                                                          Das GoConqr Quiz-Tool
                                                          Laura Overhoff
                                                          Wege, um mit GoConqr Tools zu unterrichten
                                                          Elena Koch
                                                          Wie schreibe ich eine wissenschaftliche Arbeit
                                                          Antonia C
                                                          AMERICAN DREAM
                                                          mauricedamberg
                                                          Shakespeare
                                                          Antonia C
                                                          Marketing-Mix
                                                          Marion Engel
                                                          Grundzüge Soziologie Richter
                                                          Kamila rURKA
                                                          KPOL-Fragen (sofort überprüfbar)
                                                          Tim Schröder