Home > Computers > Security > BasicSecurityGlossary| About

User Authentication

What is it ?

Making sure that the person who says I'm John is really John himself, not someone pretending to be John. If John also makes sure that the computer it tries to connect to is really the computer it tries to connect to, and not some spoofer's computer, then we're talking about mutual authentication.

How to implement it ?

Passwords, token devices, public/private key pairs.

Data authentication

It consists of two parts : data integrity and data origin authentication.

Data ingegrity

means that the data you received is strictly identical to the data that was sent to you. It hasn't been modified or tampered with (intentionally or not)

How to implement it

md5 hashes, signatures

Data origin authentication

means that the sender of the message is really the sender of the message, and not someone else claiming to be him.

How to implement it


contact : @ychaouche yacinechaouche at yahoocom

QR Code
QR Code User Authentication (generated for current page)