Authentication Techniques
نویسندگان
چکیده
An important objective of security is to provide secrecy i e to hide the contents of a publicly exposed message from unauthorized recipients In contemporary private commercial and diplomatic applications however it is frequently of equal or even greater concern that the legitimate receiver be able to verify that the message in formation has not been modi ed during its transmission or storage or that it is not a counterfeit from an unauthorized transmitter In some applications this require ment on the authenticity of information is of vital concern to all parties involved For instance in nancial transactions the party who accepts a cheque usually insists on corroborating identi cation of the party who issues the cheque authentication of the originator or the transmitter while the issuer not only lls in the face amount in numerals but also writes out the amount in script and may even go so far as to emboss that part of the cheque to make it more di cult for anyone to subsequently alter the face amount appearing on an instrument bearing his valid signature Al though this example illustrates the two main concerns of the participants in the authentication of information namely the veri cation that the communication was originated by the purported transmitter and that it hasn t subsequently been sub stituted for or altered it fails to illustrate perhaps the most important feature in the current use of authentication The information conveyed on the cheque is inextrica bly linked to a physical instrument the cheque itself for which there exist legally accepted protocols to establish the authenticity of the signature and the integrity of what the issuer wrote in the event of a later dispute as to whether the cheque is valid or the signature is genuine independent of the information content data amount etc recorded there The contemporary concern in authentication is with situations in which the exchange involves only information that is in which there is no physical instrument that can later be used to corroborate the authenticity of either the transmitter s identity or of the communication The information to be authenticated may indeed be a message in a commu nication channel but it can equally well be data in a computer le or resident software in a computer it can be quite literally a ngerprint in the application of the authentication channel to the veri cation of the identity of an individual or g uratively a ngerprint in the veri cation of the identity of a physical object such as a document or a tamper sensing container In the broader sense authentication is concerned with establishing the integrity of information purely on the basis of
منابع مشابه
DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملارائه رویکردی برای مدیریت تشخیص سریع برخط با استفاده از فناوری بیومتریک در اینترنت اشیا
Internet of Things (IOT) is a newly developed concept in the world of technology and communication which provides the ability to transfer technological information to everything, including human, animals, or objects, through communication networks such as internet or intranet. Biometric technology offers various applications. The main objective is to provide an appropriate alternative for contr...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملProcess algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کاملAuthentication Techniques for Multimedia Content
The recent proliferation of digital multimedia content has raised the issue of authentication techniques for multimedia content that is composed of still images, video and audio. Subsequently, there have been many authentication techniques for multimedia objects that have been recently proposed. One such class of techniques is based on digital watermarks and in this paper, we focus on such tech...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کامل