Please enable JavaScript.
Coggle requires JavaScript to display documents.
3 - User Authentication - Coggle Diagram
3 - User Authentication
has two steps
identification
verification
4 means of authentication, based on something the individual:
possesses
is static biometrics
knows
does dybamic biometrics
Password Vulnerabilities
Workstation hijacking
Exploiting user mistakes
Password guessing against single user
Exploiting multiple password use
Popular password attack
Electronic monitoring
Specific account attack
Offline dictionary attack
Use of Hashed Password
UNIX Implementation
Improved Implementation
Salt value
Password Cracking
dictionary attacks
rainbow table attacks
Using Better Password
Computer-generated password
Reactive password checking
User education
Proactive password checking
rule enforcement
password cracker
markov model
bloom filter
Authentication
Token Authentication
Magnetic stripe card
Memory card
Embossed card
Smart card
Biometric Authentication
Hand geometry
Retinal pattern
Fingerprints
Iris
Facial characteristics
Signature
Voice
Remote User Authentication
2) Host generate
r, h(), f()
, and return this to the user
3) User computes
f (r, h(P))
and sends back
1)
User sends identity
4) Host compare incoming with stored, if match, authenticated
Biometric Accuracy
false match rate
false non-match rate
Security Issues for User Authentication
Eavesdropping
Replay
Host attacks
Trojan horse
Client attacks
Denial-of-service