Authentication Systems

Beschreibung

Mindmap am Authentication Systems, erstellt von Davide Cometa am 18/11/2017.
Davide Cometa
Mindmap von Davide Cometa, aktualisiert more than 1 year ago
Davide Cometa
Erstellt von Davide Cometa vor mehr als 6 Jahre
30
0

Zusammenfassung der Ressource

Authentication Systems

Anmerkungen:

  • Authentication of a human, a software or an hardware system against a relaying party.
  1. Authentication mechanisms based on
    1. Knowledge
      1. Ownership
        1. Inherence
          1. Different mechanism of authentication can be combined to obtain higher levels of authentication

            Anmerkungen:

            • Multi-factor authN: more factors are combined (do not use the same factor twice e.g. two passwords).
            1. One-factor authN
              1. Two-factor authN
                1. Three-factor authN
              2. Password-based Authentication
                1. One problem is the storage of the password on the server side
                  1. in clear -> anyone can access it
                    1. encrypted -> the key should be saved
                      1. Hashed -> unprotected digests are subject to dictionary attacks
                        1. Hashed with salt -> unpredictable digests are stored. Dictionary attacks and rainbow tables are made impossible
                      2. Challenge-Response Authentication
                        1. Symmetric CRA
                          1. Asymmetric CRA
                          2. One-time password Authentication

                            Anmerkungen:

                            • a simple authentication technique where the password is used only once as authentication information to verify the identity
                            1. Synchronous

                              Anmerkungen:

                              • password depends on time
                              1. RSA SecurID

                                Anmerkungen:

                                • It is a proprietary solution intrinsically connected with the producer.
                              2. Asynchronous
                                1. S/KEY
                                2. Event-based OTP
                                  1. OOB OTP

                                    Anmerkungen:

                                    • A sort of Password-based authN that increments security by using an out of band OTP exchange (SMS, PSTN are deprecated)
                                    1. Different solutions that are not interoperetable is not good. A common standard has been developed
                                      1. OATH
                                        1. HMAC OTP
                                          1. TOTP
                                            1. OCRA
                                              1. PSKC
                                                1. DSKPP
                                            2. Biometric Authentication
                                              1. Captcha
                                                1. Biometric Techniques
                                                  1. API/SPI standardized by CDSA
                                                    1. FIDO
                                                  2. Zero Knowledge Password Proof
                                                    1. SSO - Single Sign-On
                                                      1. Fictious

                                                        Anmerkungen:

                                                        • Different services require different authentication passwords that are provided by a manager that asks for a global password (like the password wallet, that automatically manages pwds and authNs).
                                                        1. Integral
                                                          1. Multi-application

                                                            Anmerkungen:

                                                            • asymmetric challenge-response systems. All the services are able to recognize the same user credential.
                                                            1. Kerberos
                                                            2. Multi-domain

                                                              Anmerkungen:

                                                              • A service accepts the credential of a service in another domain (like the access with google account on different websites).
                                                          Zusammenfassung anzeigen Zusammenfassung ausblenden

                                                          ähnlicher Inhalt

                                                          Tipps zum Erstellen von Mindmaps
                                                          max.grassl
                                                          Französisch für Anfänger
                                                          JohannesK
                                                          3) Aufbau der Materie
                                                          Mary Wonderland
                                                          Zivilrecht - Zivilprozessrecht Streitigkeiten
                                                          myJurazone
                                                          IKA-Theoriefragen Serie 18 (15 Fragen)
                                                          IKA ON ICT GmbH
                                                          Gesellschaftsdiagnosen Bogner SS15
                                                          Yvonne D. Sulzbe
                                                          WT1 Uni Due
                                                          Awash Kaul
                                                          Vetie Pharmakologie 2018
                                                          Tropsi B
                                                          Para 2016
                                                          Anne Käfer
                                                          Vetie - AVO 2018
                                                          Schmolli Schmoll
                                                          Vetie: Geflügelkrankheiten 2020 (Matrikel 2015)
                                                          Ro F