Authentication methods
Authentication is not just the first step but also the most critical. Improper authentication can lead to potential loss of confidentiality, integrity, and availability. A man-in-the-middle attack can occur if the remote server is not verified, leading to spying, manipulation, or blocking of data. Weak password authentication can be exploited by brute force attacks.
Three examples are provided here. The first example covers password authentication, which is common, but not recommended due to the low entropy and bit count of passwords compared with that of cryptographic keys. The second example demonstrates how to use a private key to authenticate with a remote server. Both of these examples ignore the public key provided ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access