Access Authentication

Access Authentication

Manuel Mogollon (University of Dallas, USA)
Copyright: © 2008 |Pages: 37
DOI: 10.4018/978-1-59904-837-6.ch007
OnDemand PDF Download:
$37.50

Abstract

Unless a corporation can reliably authenticate its network users, it is not possible to keep unauthorized users out of its networks. Authentication is essential for two parties to be able to trust in each other’s identities. Authentication is based on something you know (a password), on something you have (a token card, a digital certificate), or something that is part of you (fingerprints, voiceprint). A strong authentication requires at least two of these factors. The following mechanisms of authentication are described in this chapter: (1) IEEE 802.1X Access Control Protocol; (2) Extensible Authentication Protocol (EAP) and EAP methods; (3) traditional passwords; (4) Remote Authentication Dial-in Service (RADIUS); (5) Kerberos authentication service; and (6) X.509 authentication.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Foreword
John H. Nugent
Acknowledgment
Manuel Mogollon
Chapter 1
Classic Cryptography  (pages 1-14)
Manuel Mogollon
Chapters 1 and 2 cover information on classic cryptography and the aspects of information security related to security services and mechanisms. The... Sample PDF
Classic Cryptography
$37.50
Chapter 2
Information Assurance  (pages 15-32)
Manuel Mogollon
The TCP/IP protocol is becoming the world standard for network and computer communications. The number of TCP/IP applications on the Internet and in... Sample PDF
Information Assurance
$37.50
Chapter 3
Manuel Mogollon
Mathematics plays an important role in encryption, public-key, authentication, and digital signatures. Knowing certain basic math concepts such as... Sample PDF
Number Theory and Finite Fields
$37.50
Chapter 4
Manuel Mogollon
In the world of communications, assurance is sought that (1) a message is not accidentally or deliberately modified in transit by replacement... Sample PDF
Confidentiality: Symmetric Encryption
$37.50
Chapter 5
Manuel Mogollon
Asymmetric encryption is a form of cryptography in which one key is used to encipher and the other to decipher. The two keys are mathematically... Sample PDF
Confidentiality: Asymmertic Encrypton
$37.50
Chapter 6
Manuel Mogollon
In this chapter, methods that can check if a message was modified are explained; this includes the Message Authentication Code (MAC), hash... Sample PDF
Integrity and Authentication
$37.50
Chapter 7
Access Authentication  (pages 152-188)
Manuel Mogollon
Unless a corporation can reliably authenticate its network users, it is not possible to keep unauthorized users out of its networks. Authentication... Sample PDF
Access Authentication
$37.50
Chapter 8
Manuel Mogollon
For the same level of security that public-key cryptosystems such as RSA have, elliptic curve cryptography (ECC) offers the benefit of smaller key... Sample PDF
Elliptic Curve Cryptograpy
$37.50
Chapter 9
Manuel Mogollon
In public-key encryption, the secrecy of the public key is not required, but the authenticity of the public key is necessary to guarantee its... Sample PDF
Certificates and Public Key Infrastructure
$37.50
Chapter 10
Electronic Mail Security  (pages 246-265)
Manuel Mogollon
In previous chapters of this book, crypto systems, security mechanisms, and security services have been discussed and reviewed as separate crypto... Sample PDF
Electronic Mail Security
$37.50
Chapter 11
VPNS and IPSEC  (pages 266-299)
Manuel Mogollon
Virtual private networks (VPN) and IPsec are discussed in this chapter. A VPN emulates a private wide area network (WAN) facility using IP networks... Sample PDF
VPNS and IPSEC
$37.50
Chapter 12
TLS, SSL, and SET  (pages 300-333)
Manuel Mogollon
In an Internet commercial transaction, the secure Web server and the buyer’s computer authenticate each other and encipher the data transmitted... Sample PDF
TLS, SSL, and SET
$37.50
Chapter 13
Web Services Security  (pages 334-408)
Manuel Mogollon
A service is an application offered by an organization that can be accessed through a programmable interface. Web services allow computers running... Sample PDF
Web Services Security
$37.50
Chapter 14
Wireless Security  (pages 409-446)
Manuel Mogollon
The nature of wireless is that of a physically open medium which makes authentication, access control, and confidentiality necessary in the... Sample PDF
Wireless Security
$37.50
Glossary of Terms
About the Author