2011
DOI: 10.6028/nist.sp.800-63-1
|View full text |Cite
|
Sign up to set email alerts
|

Electronic authentication guideline

Abstract: This publication has been developed by NIST to further its statutory responsibilities under the Federal Information Security Management Act (FISMA), Public Law (P.L.) 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercising policy authority over such systems. This … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
135
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 83 publications
(135 citation statements)
references
References 2 publications
(2 reference statements)
0
135
0
Order By: Relevance
“…In such case, the search space is narrowed to 5 8 ∼ = 2 18 . However, an eight character password has entropy of 18-30 bits [3]. So, the overall system entropy is about 36-48 bits.…”
Section: Security Analysismentioning
confidence: 98%
“…In such case, the search space is narrowed to 5 8 ∼ = 2 18 . However, an eight character password has entropy of 18-30 bits [3]. So, the overall system entropy is about 36-48 bits.…”
Section: Security Analysismentioning
confidence: 98%
“…1) Attack 1: The attacker managed to steal the RFID tag from user U but does not know his password. If the password has 8 randomly generated characters, it may have up to 52 bits of entropy [48]. Therefore, P W = P W with high probability and as a result the decrypted sequences from the database will be different than those used in the enrollment phase of user U for the generation of the shuffled iris pseudo-code I Sh , that is to say SC = SC, SS = SS e K X1 = K X1 .…”
Section: B Estimation Of the Entropy Of The Keymentioning
confidence: 98%
“…[8] defines authentication level of assurance (LoA) as the strength of authentication required for a relying party to be assured that an entity is indeed the claimed entity. It is influenced by all the factors directly or indirectly associated to the process, including the method used for identity proofing, the authentication protocol/method used by the underlying authentication service and the environment under which the authentication is performed [4,8,9]. Furthermore, LoA is also influenced by how credentials are managed.…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, if we choose a more stringent authentication method to match with the authentication requirements related to more sensitive resources, accesses to less sensitive resources will experience unnecessary higher costs in performance and usability. To overcome this limitation, there is a need for the design and development of an adaptive authentication solution that allows the selection of different authentication methods with varying levels of assurance (LoA) [4,6] as matched with resource sensitivity levels at run-time. For doing so, we need to investigate all the authentication models and examine their LoA-effecting attributes to study and quantify their individual LoA impacts to an authentication instance (or event), analyse their inter-relationships and composite effect on the overall LoA (i.e.…”
Section: Introductionmentioning
confidence: 99%