Ch. 3 - Vocab Flashcards
biometric
attempts to authenticate an individual based on their unique physical characteristics
challenge-response protocol
computer generates a challenge, while the smart token generates a response
claimant
party to be authenticated
credential
data structure that binds an identity to a token possessed by a subscriber
credential service provider
provides an electronic credential to the subscriber
dynamic biometric
characteristics based on what you do, these includes voice and signature
enroll
extraction of a set of biometric features that can be stored as a set of number
hashed password
password and salt serve as inputs to a hashing algorithm to produce a hash code
identification
individual uses a biometric sensor but presents no additional information
memory card
can store but not process data, usually has a magnetic strip in the back
nonce
an arbitrary number that can be used just once in a cryptographic communication
password
a memorized secret, typically a string of characters, usually used to confirm the identity of a user
rainbow table
a table consisting a list of hash values corresponding to a large number possible passwords with each salt value
registration authority
trusted entity that vouches for the identity of an applicant to a CSP
relying party
the party who uses authenticated information provided by the verifier to make access control decisions
salt
a random value combined with a password to generate a hash, making it more difficult to apply a dictionary attack
shadow password file
a separate place for hashed password from user IDs, needs root permissions to access this
smart card
a physical electronic authorization device, used to control access to a resource
static biometric
characteristics based on who you are; these include the hand, face, finger, retina, and iris
subscriber
is provided a credential by the CSP
token
objects that a user possesses for the purpose of user authentication
user authentication
user’s identity is verified and this identity is used to make access control decisions
verification
user enters a PIN and uses a biometric sensor
verifier
party verifying that identity