翻訳と辞書
Words near each other
・ Authorized Protective Eyewear List
・ Authorized service provider
・ Authorpe
・ Authorpe railway station
・ Authors (card game)
・ Authors Alliance
・ Authors Anonymous
・ Authors Guild
・ Authors Guild, Inc. v. Google, Inc.
・ Authenticated encryption
・ Authenticated Identity Body
・ Authenticated Key Exchange
・ Authentication
・ Authentication (law)
・ Authentication Open Service Interface Definition
Authentication protocol
・ Authentication server
・ Authenticator
・ Authenticity
・ Authenticity (Foreign Exchange album)
・ Authenticity (philosophy)
・ Authenticity (reenactment)
・ Authenticity and Development Front
・ Authenticity and Modernity Party
・ Authenticity in art
・ Authenticity Party
・ Authenticity Tour
・ Authenticité
・ Authenticité (Zaire)
・ Authenticom, Inc.


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Authentication protocol : ウィキペディア英語版
Authentication protocol

An authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of authentication data between two entities. It allows to authenticate the connecting entity (e.g. Client connecting to a Server) as well as authenticate itself to the connecting entity (Server to a client) by declaring the type of information needed for authentication as well as syntax. It is the most important layer of protection needed for secure communication within computer networks.
==Purpose==

With the increasing amount of trustworthy information being accessible over the network the need for keeping unauthorized persons from access to this data emerged. Stealing someone's identity is easy in the computing world - special verification methods had to be invented to find out whether the person/computer requesting data is really who he says that he is. The task of the authentication protocol is to specify the exact series of steps needed for execution of the authentication. It has to comply with the main protocol principles:
# A Protocol has to involve two or more parties and everyone involved in the protocol must know the protocol in advance.
# All the included parties have to follow the protocol.
# A protocol has to be unambiguous - each step must be defined precisely.
# A protocol must be complete - must include a specified action for every possible situation.
An illustration of password-based authentication using simple authentication protocol:
Alice (an entity wishing to be verified) and Bob (an entity verifying Alice's identity) are both aware of the protocol they agreed on using. Bob has Alice's password stored in a database for comparison.
# Alice sends Bob her password in a packet complying with the protocol rules.
# Bob checks the received password against the one stored in his database. Then he sends a packet saying "Authentication successful" or "Authentication failed" based on the result.
This is an example of a very basic authentication protocol vulnerable to many threats such as eavesdropping, replay attack, man-in-the-middle attacks, dictionary attacks or brute-force attacks. Most recently used authentication protocols are much more complicated in order to be more resilient against these attacks.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Authentication protocol」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.