Last updated: Nov 28, 2022

Identify Schemes

We need some schemes or methods to uniquely identify anything. Just following this, in cryptography to identify unique records we work with these identification schemes. All of us would want that the message for example, that we are sending to our Friend Tom Mitchell should go to that specific Tom Mitchell only.
Introduction to Identification or Entity Authentication
In this blog, we will learn about Entity authentication or Identification. Also, we will know what are the Identification Protocol’s basis, applications and properties.
Author Rashi
0 upvotes
Enter Your Password and Make Sure it is Strong
In this blog, we will learn about how to provide security using Passwords and different attacks on Password security.
Securing the Identification Schemes
In this blog, we will learn about secure identification schemes in Cryptography.
Attack With Model With Adversarial Goals
In this article, we will look into an attack with model with adversarial goals and some related topics.
Author Shiva
0 upvotes
It’s Mutual Authentication
In this article, we will look into mutual authentication, how we use it, and some prerequisites.
Author Shiva
0 upvotes
Challenge and response in the Public-key setting HARD
In this article, we will understand the Challenge and response authentication in the Public-key setting. We will also see its uses and limitations.
The Schnorr Identification Scheme HARD
In this article, we will understand Schnorr Identification Scheme. We will see its uses, working, and how secure it is.
The Feige-Fiat-Shamir Identification Scheme - it’s crowded here MEDIUM
Several aspects of one of the most important Identification Schemes: Feige-Fiat-Shamir Identification Scheme.