ABSTRACT

Authentication defends the universe of connectivity against attackers by verifying identities at entry points to manage security. This identification applies to both entities that manipulate data and information itself that data carry. Communicating entities should identify one another. Information exchanged during

communication should be validated as regards its origin, time, content, and so on. Therefore, authentication is usually divided into two major classes: entity authentication and message authentication.