Authentication Overview: Definition and Means

 
 
Johann Felix Conceicao
411106
Te Comp
 
Outline
 
Definition
 Steps in Authentication
Means of Authentication
Password Authentication
Token-Based Authentication
Biometrics
 
 
Definition
 
What is Authentication?
 
General
Verification
 of the genuineness of
document
 or 
signature
, to make it 
effective
 or 
valid
.
 
Computer
 
access
: Verification of the 
identity
 of
user
 through a 
code
 such as a 
password
.
 
Authentication consist of two steps
 
Identification Step: Presenting an identifier
to the security system.
Verification Step: Generate authentication
information  which provides binding
between the entity and the identifier.
 
Means of Authentication
 
1.
Something the individual knows. Eg: Password
2.
Something the individual possesses. Eg: Smart
Cards, Physical Keys.(Token Based )
3.
 Something the individual is. Eg: Fingerprints,
Face. (Static Biometrics)
4.
Something the individual does. Eg: Signature
(handwriting char.),Voice patterns. (Dynamic
Biometrics)
 
Password Based Authentication
 
Setup
User chooses password
Hash of password stored in password
file
Authentication
User logs into system, supplies
password
System computes hash, compares to
file
 
Basic password scheme
 
Hash function  h : strings 
 strings
User password stored as h(password) in password
file
When user enters password
System computes h(password)
Compares with entry in password file
If password entered by user is equal to password
from password file, then user is authenticated.
Else it gives an error …saying that username or
password is incorrect.
 
Basic password scheme
 
Password file
 
User
   exrygbzyf
   kgnosfix
   ggjoklbsz
 
 
kiwifruit
 
hash function
 
Token Based Authentication
 
Objects that a user possesses for the purpose of user
authentication are called tokens (security tokens).
Security tokens are used to prove one's identity
electronically (eg: Customer’s trying to access their
bank account).
Thus it acts like an electronic key to access something.
It is a small hardware device that the owner carries to
authorize access to a network service.
The device may be in the form of a 
smart card
 or may
be embedded in a commonly used object such as a 
key
fob.
 
 
Conti…..
 
Security tokens provide an extra level of assurance
through a method known as 
two-factor authentication
:
the user has a personal identification number (
PIN
),
which authorizes them as the owner of that particular
device; the device then displays a number which
uniquely identifies the user to the service, allowing
them to log in.
Unlike a password, a security token is a physical object.
A key fob, for example, is practical and easy to carry,
and thus, easy for the user to protect. Even if the key
fob falls into the wrong hands, however, it can't be
used to gain access because the PIN (which only the
rightful user knows) is also needed.
 
Biometric Authentication
 
A biometric authentication system attempts to
authenticate an individual based on his or her unique
physical characteristics.
Individuals characteristics can be  static characteristics
(fingerprints, hand geometry, facial characteristics,
and retinal and iris patterns) and dynamic
characteristics (voiceprint and signature).
Advantages:
 Cannot be disclosed, lost, forgotten
Disadvantages:
Cost, installation, maintenance
 
 
Biometrics
 
Physiological
Iris
Fingerprint (including nail)
Hand (including knuckle, palm, vascular)
Face
Voice
Retina
DNA
Even Odor, Earlobe, Sweat pore, Lips
Behavioral (patterns)
Signature
Keystroke
Voice
 
Physiological Biometrics
 
Fingerprints
: 
A fingerprint is the pattern of ridges on
the surface of the fingertip.
Two premises for fingerprint identification
Fingerprint details are permanent
Fingerprints are unique
Face: 
Facial characteristics are the most common
means of human-to-human identification.
We can define characteristics based on relative
location and shape of key facial features, such as eyes
eyebrows, nose, lips, and chin shape.
 
Physiological Biometrics
 
Retinal Pattern
: The pattern formed by veins beneath
the retinal surface is unique and therefore suitable for
identification.
Hand
: 
Hand geometry systems identify features of the
hand, including shape, and lengths and widths of
fingers.
Iris
: The detailed structure of the iris also a unique
physical characteristic in authentication.
 
Behavioral Biometrics
 
 
Signature: 
Each individual has a unique style of
handwriting, and this is reflected especially in the
signature, which is typically a frequently written
sequence.
However, multiple signature samples from a single
individual will not be identical.
This complicates the task of developing a computer
representation of the signature that can be matched to
future samples.
 
Behavioral Biometrics
 
 
Voice
: 
Voice patterns are more closely tied to the
physical and anatomical characteristics of the speaker.
There is still a variation from sample to sample over
time from the same speaker, complicating the
biometric recognition task.
 
References
 
Operating Systems by William Stallings
  
page no: 668-669, 672-675
 
Questions
 
Explain Password Protection Technique.
Write a short note on Biometrics
What are the four means of authentication?
Explain with examples.
 
 
Thank You
Slide Note
Embed
Share

The essential concepts of authentication, including its definition, means, steps, and types like password-based and token-based authentication. Learn about the importance of identification and verification in securing access to systems and the various factors involved in authentication methods."

  • Authentication
  • Definition
  • Means
  • Identification
  • Verification

Uploaded on Feb 15, 2025 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Johann Felix Conceicao 411106 Te Comp

  2. Outline Definition Steps in Authentication Means of Authentication Password Authentication Token-Based Authentication Biometrics

  3. Definition What is Authentication? General: Verification of the genuineness of a documentorsignature, to make iteffectiveorvalid. Computeraccess: Verification of the identityof a userthrough a code such as a password.

  4. Authentication consist of two steps Identification Step: Presenting an identifier to the security system. Verification Step: Generate authentication information which provides binding between the entity and the identifier.

  5. Means of Authentication Something the individual knows. Eg: Password 1. 2. Something the individual possesses. Eg: Smart Cards, Physical Keys.(Token Based ) Something the individual is. Eg: Fingerprints, Face. (Static Biometrics) 4. Something the individual does. Eg: Signature (handwriting char.),Voice patterns. (Dynamic Biometrics) 3.

  6. Password Based Authentication Setup User chooses password Hash of password stored in password file Authentication User logs into system, supplies password System computes hash, compares to file

  7. Basic password scheme Hash function h : strings strings User password stored as h(password) in password file When user enters password System computes h(password) Compares with entry in password file If password entered by user is equal to password from password file, then user is authenticated. Else it gives an error saying that username or password is incorrect.

  8. Basic password scheme User Password file kiwifruit exrygbzyf kgnosfix ggjoklbsz hash function

  9. Token Based Authentication Objects that a user possesses for the purpose of user authentication are called tokens (security tokens). Security tokens are used to prove one's identity electronically (eg: Customer s trying to access their bank account). Thus it acts like an electronic key to access something. It is a small hardware device that the owner carries to authorize access to a network service. The device may be in the form of a smart card or may be embedded in a commonly used object such as a key fob.

  10. Conti.. Security tokens provide an extra level of assurance through a method known as two-factor authentication: the user has a personal identification number (PIN), which authorizes them as the owner of that particular device; the device then displays a number which uniquely identifies the user to the service, allowing them to log in. Unlike a password, a security token is a physical object. A key fob, for example, is practical and easy to carry, and thus, easy for the user to protect. Even if the key fob falls into the wrong hands, however, it can't be used to gain access because the PIN (which only the rightful user knows) is also needed.

  11. Biometric Authentication A biometric authentication system attempts to authenticate an individual based on his or her unique physical characteristics. Individuals characteristics can be static characteristics (fingerprints, hand geometry, facial characteristics, and retinal and iris patterns) and dynamic characteristics (voiceprint and signature). Advantages: Cannot be disclosed, lost, forgotten Disadvantages: Cost, installation, maintenance

  12. Biometrics Physiological Iris Fingerprint (including nail) Hand (including knuckle, palm, vascular) Face Voice Retina DNA Even Odor, Earlobe, Sweat pore, Lips Behavioral (patterns) Signature Keystroke Voice

  13. Physiological Biometrics Fingerprints: A fingerprint is the pattern of ridges on the surface of the fingertip. Two premises for fingerprint identification Fingerprint details are permanent Fingerprints are unique Face: Facial characteristics are the most common means of human-to-human identification. We can define characteristics based on relative location and shape of key facial features, such as eyes eyebrows, nose, lips, and chin shape.

  14. Physiological Biometrics Retinal Pattern: The pattern formed by veins beneath the retinal surface is unique and therefore suitable for identification. Hand: Hand geometry systems identify features of the hand, including shape, and lengths and widths of fingers. Iris: The detailed structure of the iris also a unique physical characteristic in authentication.

  15. Behavioral Biometrics Signature: Each individual has a unique style of handwriting, and this is reflected especially in the signature, which is typically a frequently written sequence. However, multiple signature samples from a single individual will not be identical. This complicates the task of developing a computer representation of the signature that can be matched to future samples.

  16. Behavioral Biometrics Voice: Voice patterns are more closely tied to the physical and anatomical characteristics of the speaker. There is still a variation from sample to sample over time from the same speaker, complicating the biometric recognition task.

  17. References Operating Systems by William Stallings page no: 668-669, 672-675

  18. Questions Explain Password Protection Technique. Write a short note on Biometrics What are the four means of authentication? Explain with examples.

  19. Thank You

Related


More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#