Authentication

  • Authors:
  • Roger M. Needham

  • Affiliations:
  • -

  • Venue:
  • Encyclopedia of Computer Science
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

The term authentication is used to refer to several distinct, though related, processes. The earliest use, as described in Needham and Schroeder's paper (1978), is to arrange that two entities engaged in communication, generically referred to as principals, should each be confident as to the other's identity. A more demanding requirement is for each to be able to convince a referee or arbiter that a certain transaction was performed by the other--generally known as non-repudiation. Finally, document content may need to be authenticated in the sense that its integrity is guaranteed in addition to original authorship. In theory, authentication is quite distinct from the provision of confidentiality, but in practice they often go together.