ITIS 3200 Lecture Notes - Lecture 2: Nt Lan Manager, Plaintext, Phishing
Document Summary
Seeks to confirm that an entity is who he/she/it claims to be. Methods to authenticate should be reliable and authentication methods (password, pin, etc) should be private. Real life example: i"m dan *dan shows his id* Biometrics (face, fingerprint, voice, retinal: what you have. Physical key, passport, security token: you use a combination of these to increase security. The cryptographic hash value of the password is stored. X y , we can check this. But if you know y, you cannot find x. (y x) When you enter you pw, the computer hashes it and compares it to the hash already stored on the computer. Lm (windows xp) or ntlm (the newer versions of windows) Precomputed table of computed passwords in hash values. They can then match the hash and know what your password is. A random value (string) added to the password.