Authentication Methods and Protocols

Commercial authentication systems


  1. Which type of cryptography does not require a key?
  2. How does the problem of secure key exchange connect symmetric cryptography to asymmetric cryptography?
  3. Why do password authentication systems use hashing functions instead of symmetric cryptography or asymmetric cryptography?
  4. What additional benefit does message authentication codes (MAC) provide over a dedicated hash function?
  5. What are the purposes of using patents?
  6. What is a trademark?
  7. What is a copyright?
  8. What are the advantages and risks with protecting intellectual property as trade secrets?
  9. Provide examples of security technology businesses that takes a:
    • Product centred sales approach
    • Customer centred sales approach
    • Service centred sales approach
  10. The information security market could be broadly categorised as companies that provide data confidentiality, data integrity and/or data availability. What are some specific commercial examples for each category?


Asymmetric encryption addresses the key exchange problem

Asymmetric encryption

Digital signature algorithms