Do you think IIT Guwahati certified course can help you in your career?
No
Introduction
Let's say you need to prove your identity to someone else. According to some, this can be done in one of three ways, depending on who you are, what you know, or what you have. This is the main foundation of identification, as we will see in this article.
Throughout this article, the terms identification and entity authentication are used synonymously. There is a distinction between weak, strong, and zero-knowledge authentication. In the literature, identification sometimes refers to a claimed or stated identity, whereas entity authentication refers to a validated identity.
Identification or Entity Authentication
Entity authentication is the procedure by which each entity (the verifier) confirms the identity of another entity (the claimant) engaging in a protocol. This assurance is typically obtained by mandating the claimant to provide the verifier with verifying evidence of the claimed identity. The claimed identity can be presented to the verifier as part of the procedure or inferred from context.
Identification protocol is often used as a synonym for entity authentication. Still, it can also refer to claiming or stating an identity without offering the corroborating evidence required for entity authentication. When using this term, care must be taken to ensure that the correct interpretation is used.
Objective of Identification Protocol
The outcome of an entity authentication protocol, from the perspective of the verifier, is either acceptance of the claimant's identity as authentic, i.e., completion with acceptance or termination without acceptance, i.e., rejection. The following are the specific objectives of an identification protocol.
In the case of trustworthy parties A and B, A can successfully authenticate itself to B. Then B will complete the protocol after accepting the identity of A.
Transferability: Reusing an identification exchange with A is impossible to impersonate A to a third party C successfully.
Impersonation: The likelihood that any party C, different from A, following the protocol and playing the role of A, will cause B to complete and accept A's identity is negligible. In this context, negligible typically means "so small as to be of no practical significance"; the precise definition depends on the application.
Identification Protocol Basis
Entity authentication techniques can be divided into three main categories based on which of the following is used to secure the entity:
Something Known
Some examples are shared passwords, sometimes used to generate a symmetric key. PINs and secret or private keys whose knowledge is demonstrated in challenge-response protocols.
Something Possessed
This is typically a physical accessory that functions similarly to a passport. Some of the examples are listed below:
Methods that use human physical characteristics and involuntary actions like biometrics, such as handwritten signatures, voice, fingerprints, retinal patterns, hand geometries, and dynamic keyboarding characteristics, fall into this category.
Applications of Identification Protocol
One of the primary purposes of identification, when an access privilege is linked to a specific identity, is to facilitate access control to a resource, such as:
Computer accounts can be accessed locally or remotely.
withdrawals from automated teller machines.
permissions to communicate via a communications port.
use of software applications.
physical access to prohibited areas or border crossings.
A password scheme used to gain access to a user's computer account is the most basic example of an access control matrix. Each resource has a list of associated identities, e.g., a computer account that authorized entities may access. Successful corroboration of an identity grants access to the authorized resources listed for that entity.
The motivation for identification in many applications, for example, cellular telephony, is to allow the resource usage to be tracked to the identified entities, allowing appropriate billing. Identification is also commonly required in authenticated key establishment protocols.
Properties of Identification Protocol
Identification protocols can have a variety of properties. Users are interested in the following properties:
Identification reciprocity: One or both parties may confirm their identities to the other. Also, allows for mutual or unilateral identification. Some techniques, like fixed-password schemes, may be vulnerable to an entity impersonating a verifier to obtain a claimant's password.
Computation Efficiency: The number of operations needed to carry out a protocol.
Effective communication: Includes the number of passes (message exchanges) and the required bandwidth (total number of bits transmitted).
Involvement of a third party in real-time: Examples of third parties include an online trusted third party distributing standard symmetric keys to the entities for authentication purposes and an online (untrusted) directory sendee distributing public-key certificates supported by an offline certification authority.
Trust required in a third party: For example, relying on a third party with access to an entity's private key to correctly authenticate and link the entity's name to a public key.
Security guarantees: Provable security and zero-knowledge properties are two examples.
Secrets storage: This includes the location and method of storing critical keying material (e.g., software only, local disks, hardware tokens, etc.).
Frequently Asked Questions
What exactly is entity authentication?
The procedure of assuring the identity of an entity engaging with a system (e.g., to access a resource).
What are the three different kinds of authentication?
There are three authentication factors: Something you know is a password or PIN. Something you have is a token, such as a bank card, and something you are is biometrics, such as fingerprints and voice recognition.
What exactly is an identification protocol?
An identification protocol generally consists of claimant A and verifier B. The verifier is presented with or assumes the claimant's purported identity beforehand. The goal is to confirm that the claimant's identity is indeed A, i.e. A provides entity authentication.
What are the properties of the Identification protocol?
Identification reciprocity, computation efficiency, and effective communication are a few of the main properties of identification protocol.
Conclusions
In this blog, we have learned about Entity authentication or Identification. Also, we learned what the Identification Protocol’s basis, applications and properties are.