Remote user Authentication principles

 

User Authentication

User Authentication:

User Authentication as we are all know that" Uses Authentication" means verifying whether he/ she is a correct / Authorized user) this is to be identified before communicating with him.  THIS processes is called " User Authentication" . 


 Remote user Authentication principles :

(1) It is the Fundamental security building block.

(2) It is the Basic of access control && User accountability.

(3) It is the process of verifying an identity claimed by / For a system entity.

Note: Generally, System may Require many kinds of Credentials like passwords &, we are keeping these passwords as secret only these passwords are known By authorized Systems.


mainly there are a steps that are present in the process, of Authentication. They are:

1) Identification - Specify identifier

2) Verification - Bind entity / person and identification.


(1) Identification Step:

Presenting an identifier to the Security System.

There are 4 general means of authenticating a users identity, which can be used alone, in combination.


1. something the individual Knows:

password


Examples include like a password, a personal identification. Number (PIN), answers to a pre-arranged set of Questions. All these are comes under this particular.


2. Something the individual possesses:

Cryptographic keys


Examples include like Cryptographic keys, electronic key cards, Smart cards & physical Keys this is referred to as a token.


3. something the individual Uses [static Biometrics]:

retina & Face scanner

Examples Include recognition by Finger print, retina & Face .


4. Something the individual uses [Dynamic Biometrics]: 

 typing rhythm


Examples Include Recognitions By Voice, pattern, hand writing characteristics, and typing rhythm.


5. Verification step:

Presenting / Generating Authentication information. that corporate the binding Between the entity and the Identification.


Note: that means Normally, to Verification step, the System Receiving the information Like credentials From individual then the system checking whether the Credentials provided by the individual are valid / Not. * If the credentials provided by the individual are Valid then we can say that the Authentication is Successful otherwise Not.


There are 2 types of Authentication's. They are: 

(1) Mutual Authentication

(2) One-way Authentication


(1) Mutual Authentication :

      Mutual Authentication



It is used when two sides of a communication. channels Verify each others identify, instead of only one Side Verification. It is Also called As "two-way Authentication" the process Goes in both Directions.


Note: In mutual Authentication, there is a chance for Replay Attack


The various Replay attacks are listed below:

i . Simple Relay:

The opponent simply copies a message and Replays it later.


ii. Repetition that can be logged:

An opponent can Replay a time stamped that cannot msg within the valid time Window.


iii. Repetition that can't be Detected:

This situation could Arise because the original message could have been supreme & those Did not Arrive at its Destination only the Relay message Arrives


 Iv. Backward Replay without modification:

This is a replay Back to the msg sender. This attack es possible. If symmetrical encryption is used & the Sender cannot easily recognize the Difference Blog message sent & called on the Bases of content. message Received.


Note: To avoid this Replay attack, there are 2 Approaches:

they are:

(1) Time stamp

(2) challenge & Response.


(1) Time Stamp:

It is the 1st Approach to avoid the Replay attack. In this time stamp approach, party 'A' accepts a message as Fresh only, if the msg contains a time stamp in that, as 'A' will have a knowledge of the current time.


(2) Challenge/Response:

It is the and Approach. In this party 'A' expecting a Fresh msg from Party 'B'.

* First, B sends a B notice [challenge] to Party 'A', after that, the party 'B' receives the subsequent msg [Response] from party 'A', which contains the correct" Nonce Valve.


Note: Nonce is a private Number which used in a communication. The Above are the a approaches used. for the Avoiding Replay Attack.


2. One-way Communication:

    One-way Communication



One application for which encryption is growing in. popularity is Electronic mall [Email]. The very mature of electronic mall & its chief benefit, es that it is not necessary for the sender & Receiver to be online at the same time. Instead, the email message is Featured to the Receivers electronic mall Box, where it is buffered Until the Receiver is available to read it. 

*The envelopes / header of the e-mail message most be in the clear, so that the message can be handled by the store-and Forward e-mail protocol, such as the simple mail transfer Protocol (SMTP)



Comments

Popular posts from this blog

React-JS

E-Learning