What is authentication? explain authentication protocols, Computer Network Security

Assignment Help:

What is Authentication/confirmation?  How it is different from  the Authorization/approval?  Explain in brief different authentication protocols along with their merits and demerits.

Authentication is described below

Authentication is the process of checking the genuineness of someone (or) something which claims to be authentic.

In the internet applications, authentication can be done by means of login-ID and passwords, that is an individual who knows the correct ID and a respective password is considered to be a authentic user and is provided right to use to the internal applications. Whereas, the authorization is a process of assigning different access permissions to many  users.

The authorization is the initial task carried-out by a system administrator after authentication is carried away.

Or we can say that, a system administrator assigns access permissions and privileges to the users once they become authenticated.

Authentication Protocols can be defined as follows:

Authentication protocols are majorly used for addressing the security issues regarding the un trusted networks (internet). Many different protocols and methods/techniques are available for the authentication.

Diffie-Heliman Key Exchange Protocol can be understood as follows:

When two strangers like to set up a shared secret key, they can make use of the

'Diffie-Heliman Key Exchange Protocol'.

Working of Diffie-Heliman key exchange protocol is given below.

The senders and receivers will exchange the calculated and measured values between each other, using which they will compute the encryption. This calculation also comprises two more numbers which are not kept secret.

Consider a condition when Alice and Bob would like to communicate they require to have a shared secret key. To set up this key any one among Alice and Bob can decide to use two large prime numbers p and n such as the result of (p-1)/2 is also a prime number, and then tell the other            about these      numbers         frankly.          Then     both       of          them           will           choose their large secret numbers as a and b respectively.

To begin this key exchange protocol, suppose Alice sends the message consisting of (p, n na mod p) to Bob. Then Bob gives response with a message containing Alice will now compute the secret key by raising received message to the power a, that is,nb  mod p)a  = nab  mod p. Conversely,                Bob      will           compute           the                secret     key        by                 raising the            received message to the power b that is (na mod p)b = ( nab mod p). In due course, both Alice and Bob will now share the b secret key that is (nab mod p).

Disadvantage this process is as follows:

If an invader comes to know the p and n numbers somehow from the messages and if he also computes the a and b values then he will be easily able to compute the secret key which is shared by the sender and the receiver.

Merits of it are as follows:

(i)     This key swap algorithm enables the users to establish a shared session even with the strangers.

(ii)   Somehow if the intruder intercepts the message he/she cannot understand it unless he knows the shared session key as well.

Demerits of it are as follows:

(i)     The difficulty with the Diffie-heilman key exchange algorithm is that, it cannot pact with bucket brigade attack in which the intruder directly intercepts the session establishment messages.

(ii)   For interacting with the 'n' number of people, we require 'n' keys to be saved and managed.


Related Discussions:- What is authentication? explain authentication protocols

Application-based ids, Application-Based IDS Application-based IDS (AppI...

Application-Based IDS Application-based IDS (AppIDS) is an advanced version of HIDS. It examines application for abnormal events. The ability to view encrypted data is the uniqu

Udp interaction, UDP INTERACTION  UDP follows four kinds of interactio...

UDP INTERACTION  UDP follows four kinds of interaction 1-to-1: One application can interact with one application. 1-to-many: One application can interact with many

Define broadcasting , Broadcasting is the distribution of video and audio...

Broadcasting is the distribution of video and audio content to a whole audience via any audio or visual mass communications medium, but generally one using electromagnetic radiat

Describe how access control is implemented, Question: (a) How can you ...

Question: (a) How can you prevent someone from accessing your computer when you leave your office for some time? (b) What is the difference between a classic login and a w

Direct sequence modulation, Question 1 a) Provide three advantages of ...

Question 1 a) Provide three advantages of using optical fiber. b) Distinguish between "Direct Sequence Modulation" and "Frequency Hopping" c) Decribe the purpose of using "

Growth of lan technology, GROWTH OF LAN TECHNOLOGY The production of s...

GROWTH OF LAN TECHNOLOGY The production of shared communication channels (LANs) started in 1960s and early 1970. The basic idea behind was to reduce the number of connectio

Representation of a tcp header, (a) Figure is a representation of a TCP hea...

(a) Figure is a representation of a TCP header. For each of the fields lettered from A to G, state the name of the field and provide a brief explanation for the function of each fi

Define network, A Network is described as a system for connecting compu...

A Network is described as a system for connecting computers using a single transmission technology. The computers can interact with each other in a network. They can receive an

Routers, Routers They transfer packets among multiple interconnected n...

Routers They transfer packets among multiple interconnected network machines (i.e. LANs of different kind). They perform in the data link, physical and network layers. They ha

Calculate the minimum required signal strength, Question 1: (a) (i) Ra...

Question 1: (a) (i) Radio waves are subject to several propagation problems. Name any three of them. (ii) A Wi-Fi receiver requires a signal power of 50mW to operate correc

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd