Core Concepts

  • Identification is “claiming” an identity (e.g. “I am Mohammed”).
  • Authentication is verifying that claimed identity.
  • Authorization is deciding what that verified identity is allowed to do.
    Together, authentication plus authorization make up access control.

Three Authentication Categories

  • Something you know: This factor includes information that the user has memorized
  • Something you have: refers to physical objects that the user possesses, like a smartphone, security token, smart card, or one-time password generator
  • Something you are: is based on unique biological characteristics of the user, such as fingerprints, facial recognition, voice recognition, or iris scans

Password-Based Authentication

User picks a username + password. The system stores only a hashed version of the password (never plaintext). On login, the password you enter is hashed and compared to the stored hash.

  • Common Attacks:
    • Phishing/Spoofing: fake login pages trick into revealing your password
    • Keylogging: malware or hardware records your keystrokes
    • Brute-force/Guessing: systematically trying password combinations
    • Password reuse: same password across sites lets one breach compromise many accounts
  • Defenses and Best practices:
    • Hash + salt + slow KD so even if attackers steal the hash, they can’t crack it quickly
    • Enforce minimum length and complexity rules
    • Rate-limit or lock out accounts after repeated failures to block brute-force.
    • Provide secure password recovery (avoid emailing passwords or “yellow stickers”)

Token-Based and Biometric Authentication

  • Token-Based:
    • Physical tokens (smart cards, USB keys) store cryptographic secrets inside a tamper-resistant chip
    • Smartphone apps (TOTP, push notifications) also count as “something you have.”
    • Challenges: distribution, reader infrastructure, recovery when lost
  • Biometric
    • Physiological: fingerprint, iris, face
    • Behavioral: voice, typing pattern, gait
    • Accuracy metrics:
      • FAR (False Acceptance Rate)
      • FRR (False Rejection Rate)
      • EER (Equal Error Rate)
    • Limitations: reader quality, enrollment failures, privacy (biometrics can’t be “revoked”)

Multi-Factor and Two-Factor Authentication

  • Multi-Factor Authentication (MFA):

    • Combines two or more authentication factors (e.g. password + token)
    • Provides stronger security than single-factor methods
    • Examples: password + SMS code, password + fingerprint
  • Two-Factor Authentication (2FA):

    • A specific type of MFA that uses exactly two factors
    • Most common: password + something you have (e.g. SMS code, authenticator app)
    • Adds a second layer of security beyond just the password

Security boost: attacker must obtain both factors to break in.