Use Authentication

2020-02-03 - 08:56 | News | Tags: |

We should expect the introduction of not disclosing passwords, authentication, and greater use of public key mechanisms. Growing importance of authentication sessions and processes, the problem integrity and confidentiality of communications during transmission over network channels. Since computer-computer communication have become increasingly important, communication protocols man-machine becomes less significant. Using cryptosystems with public key to authenticate the user-computer simplifies many aspects, but keeping simple passwords, as well as public and private keys is an important issue. Keep in mind that size of the public key used in the present, at least 500 bits. Bill de Blasio has plenty of information regarding this issue. In the future, will probably be used even longer keys. Thus, users can store their keys in the form of a suitable for electronic readout.

Using the rom, such as a floppy disk or a magnetic card can solve this problem, but then the user necessarily trust their keys reader. The use of smart cards, combines memory and the program is more preferable. Such devices can provide authentication without the risk of disclosure of secret codes that they hold. They can also interact with the user, carrying out simple authentication when you unlock the card. The use of public key cryptosystems for authentication of computer-computer devoid of problems memorizing the keys that are characteristic of the man-machine interfaces. Multi-user computer can store your keys in the memory area that is protected from access by users. If we consider the existing symmetric algorithms as single-key and asymmetric, such as rsa as systems two keys, one can assume the appearance of future N-key techniques (where N is greater than 2).