Entity Authentication
Entity Authentication
Entity Authentication
Entity Authentication
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
14.1
Chapter 14
Objectives
To distinguish between message authentication and
entity authentication
To define witnesses used for identification
To discuss some methods of entity authentication
using a password
To introduce some challenge-response protocols for
entity authentication
To introduce some zero-knowledge protocols for
entity authentication
To define biometrics and distinguish between
physiological and behavioral techniques
14.2
14-1 INTRODUCTION
14.4
14.1.2 Verification Categories
Something known
Something possessed
Something inherent
14.5
14.1.3 Entity Authentication and Key
Management
14.6
14-2 PASSWORDS
14.7
14.2.1 Fixed Password
First Approach
Figure 14.1 User ID and password file
14.8
14.2.1 Continued
Second Approach
Figure 14.2 Hashing the password
14.9
14.2.1 Continued
Third Approach
14.10
14.2.1 Continued
Fourth Approach
In the fourth approach, two identification techniques are
combined. A good example of this type of authentication
is the use of an ATM card with a PIN (personal
identification number).
14.11
14.2.2 One-Time Password
First Approach
In the first approach, the user and the system agree upon
a list of passwords.
Second Approach
In the second approach, the user and the system agree to
sequentially update the password.
Third Approach
In the third approach, the user and the system create a
sequentially updated password using a hash function.
14.12
14.2.2 Continued
14.13
14-3 CHALLENGE-RESPONSE
Note
In challenge-response authentication, the claimant
proves that she knows a secret without sending it to
the verifier.
Note
The challenge is a time-varying value sent by the
verifier; the response is the result
of a function applied on the challenge.
14.15
14.3.1 Using a Symmetric-Key Cipher
First Approach
14.16
14.3.1 Continued
Second Approach
14.17
14.3.1 Continued
Third Approach.
14.18
14.3.2 Using Keyed-Hash Functions
14.19
14.3.3 Using an Asymmetric-Key Cipher
First Approach
14.20
14.3.3 Continued
Second Approach
Figure 14.10 Bidirectional, asymmetric-key
14.21
14.3.4 Using Digital Signature
First Approach
Figure 14.11 Digital signature, unidirectional
14.22
14.3.4 Continued
Second Approach
Figure 14.12 Digital signature, bidirectional authentication
14.23
14-4 ZERO-KNOWLEDGE
14.24
14.4.1 Fiat-Shamir Protocol
14.25
14.4.1 Continued
Cave Example
14.26
14.4.2 Feige-Fiat-Shamir Protocol
Figure 14.15 Feige-Fiat-Shamir protocol
14.27
14.4.3 Guillou-Quisquater Protocol
Figure 14.16 Guillou-Quisquater protocol
14.28
14.4.3 Continued
Figure 14.16 Guillou-Quisquater protocol
14.29
14-5 BIOMETRICS
14.31
14.5.2 Enrollment
14.32
14.5.3 Authentication
Verification
Identification
14.33
14.5.4 Techniques
14.34
14.5.4 Continued
Physiological Techniques
Fingerprint Hands
Iris Voice
Retina DNA
Face
14.35
14.5.4 Continued
Behavioral Techniques
Signature
Keystroke
14.36
14.5.5 Accuracy
14.37
14.5.6 Applications
14.38