AUTHENTICATING PEOPLE

CHAPTER

6

ABOUT THIS CHAPTER

In this chapter, we look at techniques to accurately associate individuals with user identities inside a computer. The discussion will focus on passwords with an introduction to other methods. The chapter examines the following topics:

  The three authentication factors: what you know, have, are

  Passwords, password bias, and average attack space

  Cryptographic building blocks: random choice, one-way hash

  Authentication devices: personal tokens and biometrics

  Basic issues in authentication policy

6.1     Unlocking a Door

We use padlocks, deadbolts, and safes to protect unattended things. We arrange it so that only authorized users may open these locks. We either restrict copies ...

Get Elementary Information Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.