Please enable JavaScript.
Coggle requires JavaScript to display documents.
AUTHENTICATION, image, image, image, image - Coggle Diagram
AUTHENTICATION
BIOMETRIC TECHNIQUES
TYPES
Behavioral biometrics
Voice recognition, handwriting, signature
Physical biometrics
Fingerprint, face recognition
-
what is biometric ?
• Biometric are body measurements and calculations related to human characteristics. Biometric authentication is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
• Biometric identifiers are the distinctive, measurable characteristic used to label and describe individuals. It is often categorized as physiological characteristics, which are related to the shape of the body
FUNCTIONS
- The first function is biometric matching or verification. The second relates to access control through biometric identification. The majority of biometric systems can be split into two different groups.
-
-
Biometric matching allows you to
identify someone out of a crowd by scanning select biometric characteristics into a database.
Biometric identification allows you to
create and store databases of biological traits and compare them to the individual attempting to gain entry into a device or facility. ex facial recognition.
-
-
DIGITAL SIGNATURE
DEFINITION
A digital signature is a mathematical technique for verifying the integrity and authenticity of a message, software, or digital document. It's the digital equivalent of a handwritten signature or a stamped seal, but it has a lot more systems installed in.
Public key cryptography, also known as asymmetric cryptography, is used to create digital signatures. Two keys are generated using a public key algorithm, resulting in a mathematically linked pair of keys, one private and one public.
The two mutually authenticating cryptographic keys of public key cryptography are used to create digital signatures. The person who creates the digital signature encrypts signature-related data with a private key, which can only be decrypted with the signer's public key.
ADVANTAGES
Workflow is more agile: several signatures may be collected in less time, simplifying administrative and legal processes.
Cost savings and environmental sustainability are achieved by lowering the amount of paper produced, duplicated, stamped, filed, and, in certain circumstances, destroyed.
Better time management: By spending less time to document management, industry experts may devote more time to higher-priority activities and fully assist their clients.
PURPOSES
Non- repudiation:
- more specifically non-repudiation of origin, is an important aspect of digital signatures. By this property, an entity that has signed some information cannot at a later time deny having signed it. Similarly, access to the public key only does not enable a fraudulent party to fake a valid signature.
- A digital signature prevents the sender of a message from later claiming that it did not send the message.
Integrity:
- A digital signature prevents the sender of a message from later claiming that it did not send the message.
- However, if a message is digitally signed, any change in the message after signature invalidates the signature. Furthermore, there is no efficient way to modify a message and its signature to produce a new message with a valid signature, because this is still considered to be computationally infeasible by most cryptographic hash functions
Authentication:
- Although messages may often include information about the entity sending a message, that information may not be accurate. Digital signatures can be used to authenticate the identity of the source messages. When ownership of a digital signature secret key is bound to a specific user, a valid signature shows that the message was sent by that user.
- The importance of high confidence in sender authenticity is especially obvious in a financial context. For example, suppose a bank's branch office sends instructions to the central office requesting a change in the balance of an account. If the central office is not convinced that such a message is truly sent from an authorized source, acting on such a request could be a grave mistake.
FEATURES
Asymmetric cryptography. Employs a public key algorithm that includes private and public key encryption and authentication.
Checksum. A long string of letters and numbers that represents the sum of the correct digits in a piece of digital data, against which comparisons can be made to detect errors or changes. A checksum acts as a data fingerprint.
Cyclic redundancy check (CRC). An error-detecting code and verification feature used in digital networks and storage devices to detect changes to raw data.
Certificate authority (CA) validation. CAs issue digital signatures and act as trusted third parties by accepting, authenticating, issuing and maintaining digital certificates. The use of CAs helps avoid the creation of fake digital certificates.
-
-
-
-