Skip to main content

Synonyms

Credential verification; Identity proof

Related Concepts

Access Control from an OS Security Perspective; Biometric Authentication

Definition

Authentication is the process of verifying an entity’s identity, given its credentials. The entity could be in the form of a person, a computer, a device, a group of network computers, etc.

Background

The need for authentication started with computers and as technology evolved and networks became more common, it gained more importance. In order to ensure a secure communication, computers need to authenticate each other.

The oldest and simplest method to provide authentication is password login. As communication systems are becoming more sophisticated, more rigorous schemes are needed to achieve authentication.

Theory

Authentication aims at proving an entity is really the one that he claims to be. Fundamentally, four methods are used to achieve authentication: something an entity knows (e.g., password), something an entity has (e.g., id...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Garman J (2003) Kerberos: the definitive guide. O’Reilly, Sebastopol

    Google Scholar 

  2. Stamp M (2005) Information security: principles and practice. Wiley, Hoboken

    Book  Google Scholar 

  3. Stewart JM, Tittel E, Chapple M (2008) CISSP: certified information systems security professional study guide, 4th edn. Sybex, San Francisco

    Google Scholar 

  4. Whitman ME, Mattord HJ (2007) Principles of information security, 3rd edn. Thomson Course Technology, Boston

    Google Scholar 

  5. Todorov D (2007) Mechanics of user identification and authentication: fundamentals of identity management. Auerbach Publications, Boca Raton

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Cankaya, E. (2011). Authentication. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_772

Download citation

Publish with us

Policies and ethics