Ch. 3 - Vocab Flashcards
biometric
attempts to authenticate an individual based on their unique physical characteristics
challenge-response protocol
computer generates a challenge, while the smart token generates a response
claimant
party to be authenticated
credential
data structure that binds an identity to a token possessed by a subscriber
credential service provider
provides an electronic credential to the subscriber
dynamic biometric
characteristics based on what you do, these includes voice and signature
enroll
extraction of a set of biometric features that can be stored as a set of number
hashed password
password and salt serve as inputs to a hashing algorithm to produce a hash code
identification
individual uses a biometric sensor but presents no additional information
memory card
can store but not process data, usually has a magnetic strip in the back
nonce
an arbitrary number that can be used just once in a cryptographic communication
password
a memorized secret, typically a string of characters, usually used to confirm the identity of a user
rainbow table
a table consisting a list of hash values corresponding to a large number possible passwords with each salt value
registration authority
trusted entity that vouches for the identity of an applicant to a CSP
relying party
the party who uses authenticated information provided by the verifier to make access control decisions