Authentication: From Passwords to Public Keys
This volume examines techniques for contemporary authentication methods for computer access control and security passwords, and also looks at how to choose the best authentication method for any given situation. It starts with a simple case study of a single workstation, and works its way up to more elaborate situations involving networks and remote access.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
access control administrators algorithm Attack Description authentication server authentication system average attack space base secret biometric bits browser Cathy Cathy's certificate authority challenge response Chapter client connection copy crack cryptographic database decrypt Defense described device dictionary attacks digital signature domain controller encryption key example Figure fingerprint guess hardware hashed password host indirect authentication intercept Internet John Kerberos lock login mail server master key match memorized Microsoft nonce Note NTLM off-line one-time password passphrase password file password hash password token pattern person physical plaintext private key problem procedure proprietor protect protocol public key certificate public key cryptography random replay retrieve risk SafeWord secret key Section session key shared secret smart card sniffing software token sophisticated stored strategy techniques ticket Tim's timesharing tion Unix user name user's vendors verify Windows NT word workstation