Authentication Techniques
Strong user authentication
- Smart cards or tokens
- Software (server) and smartcard based
- PIN-protected smartcard private key
- System issues challenge based on user
- User uses password to unlock smartcard, which reads challenge, calculates cryptographic response
- Response is used as response to challenge