Lecture 08
Lecture 08
Security
Chapter 15
User Authentication
User Authentication
4
Forms of Authentication
5
Multiple Factors and Effectiveness
of Authentication
• To increase authentication effective ness, a scheme with
multiple methods is used. Systems using a scheme with two
or more methods can result in greater system security
• The popular technique, referred to as multi-factor
authentication, overcome the limitations of a specific
authentication.
6
Authentication Elements
7
Authentication Elements
8
Types of Authentication
10
Authentication Methods
11
Authentication Protocols
• have considered:
• remote user authentication issues
• authentication using symmetric encryption
• the Kerberos trusted key server system
• authentication using asymmetric encryption
• federated identity management