Cryptography-Based Authentication for Protecting Cyber Systems

Cryptography-Based Authentication for Protecting Cyber Systems

Xunhua Wang, Hua Lin
ISBN13: 9781615207831|ISBN10: 161520783X|EISBN13: 9781615207848
DOI: 10.4018/978-1-61520-783-1.ch002
Cite Chapter Cite Chapter

MLA

Wang, Xunhua, and Hua Lin. "Cryptography-Based Authentication for Protecting Cyber Systems." Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, edited by Hamid R. Nemati and Li Yang, IGI Global, 2011, pp. 32-51. https://doi.org/10.4018/978-1-61520-783-1.ch002

APA

Wang, X. & Lin, H. (2011). Cryptography-Based Authentication for Protecting Cyber Systems. In H. Nemati & L. Yang (Eds.), Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering (pp. 32-51). IGI Global. https://doi.org/10.4018/978-1-61520-783-1.ch002

Chicago

Wang, Xunhua, and Hua Lin. "Cryptography-Based Authentication for Protecting Cyber Systems." In Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, edited by Hamid R. Nemati and Li Yang, 32-51. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-61520-783-1.ch002

Export Reference

Mendeley
Favorite

Abstract

Entity authentication is a fundamental building block for system security and has been widely used to protect cyber systems. Nonetheless, the role of cryptography in entity authentication is not very clear, although cryptography is known for providing confidentiality, integrity, and non-repudiation. This chapter studies the roles of cryptography in three entity authentication categories: knowledge-based authentication, token-based authentication, and biometric authentication. For these three authentication categories, we discuss (1) the roles of cryptography in the generation of password verification data, in password-based challenge/response authentication protocol, and in password-authenticated key exchange protocols; (2) the roles of cryptography in both symmetric key-based and private key-based token authentications; (3) cryptographic fuzzy extractors, which can be used to enhance the security and privacy of biometric authentication. This systematic study of the roles of cryptography in entity authentication will deepen our understanding of both cryptography and entity authentication and can help us better protect cyber systems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.