This is the second part in a list of cheatsheets based on the book Network Security: Private Communications in a Public World (2nd Edition).
This post is about authentication. The first part, Cryptography Introduction Cheatsheet – part 1, was about cryptography.
Authentication is the process of reliably identifying the identity of someone.
Password based authentication happens via a secret quantity. The biggest drawback is eavesdropping. Guessing the password can happen online or offline. Offline … Read more.