Chapter 20
Hash and Authentication
The learning goals for this chapter are as follows:
- Understand Authentication and the critical role it plays in network security
- Explore the historical development of hash functions, their salient properties and use in authentication
- Examine the security properties of the currently viable hash functions as well as hash function attacks
- Investigate password-based authentication and the various hash-dependent mechanisms that are employed in this technique
- Understand the vulnerability of password authentication
- Learn the most popular password-based security protocols
- Explore the properties and usefulness of one-time passwords as well as their advantage over static passwords
20.1 Authentication Overview
When ...
Get Introduction to Computer Networks and Cybersecurity now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.