Chapter 10 Contents
10 Identification and Entity Authentication10.1 Introduction 10.1.1 Identification objectives and applications 10.1.2 Properties of identification protocols 10.2 Passwords (weak authentication) 10.2.1 Fixed password schemes: techniques 10.2.2 Fixed password schemes: attacks 10.2.3 Case study - UNIX passwords 10.2.4 PINs and passkeys 10.3 Challenge-response identification (strong authentication) 10.3.2 Challenge-response by symmetric-key techniques 10.3.3 Challenge-response by public-key techniques 10.4 Customized and zero-knowledge identification protocols 10.4.1 Overview of zero-knowledge concepts 10.4.2 Feige-Fiat-Shamir identification protocol 10.4.3 GQ identification protocol 10.4.4 Schnorr identification protocol 10.4.5 Comparison: Fiat-Shamir, GQ, and Schnorr 10.5 Attacks on identification protocols 10.6 Notes and further references
Return to the Table of contents