Talk With an Expert

An Overview of Different Authentication Methods and Protocols

An Overview of Different Authentication Methods and Protocols (PDF, 1.75MB)Published: 23 Oct, 2001
Created by
Richard Duncan

Authentication can be accomplished in many ways. The importance of selecting an environment appropriate Authentication Method is perhaps the most crucial decision in designing secure systems. Authentication protocols are capable of simply authenticating the connecting party or authenticating the connecting party as well as authenticating itself to the connecting party. This overview will generalize several Authentication Methods and Authentication Protocols in hopes of better understanding a few options that are available when designing a security system.