Chapter Opener Photo

© Digital_Art/Shutterstock

CHAPTER 6Authenticating People

About This Chapter

In this chapter, we look at techniques to accurately associate individuals with user identities inside a computer. The discussion will focus on passwords with an introduction to other methods. The chapter examines the following topics:

  • ■   The three authentication factors: what you know, you have, and you are

  • ■   Passwords, password bias, and search space calculations

  • ■   Cryptographic building blocks: random choice, one-way hash

  • ■   Authentication devices: personal tokens and biometrics

  • ■   Basic issues in authentication policy

Get Elementary Information Security, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.