Authentication Methods and Protocols

Advanced authentication methods


  1. What is the difference between random sequences and pseudo-random sequences?
  2. Which methods could be used to produce random sequences and pseudo-random sequences?
  3. Why is randomness important to authentication and encryption?
  4. What is involved in the use of steganography?
  5. What are the similarities and differences between steganography and cryptography?
  6. Provide examples of steganography that uses these techniques:
    • Injection – The plain text is embedded directly into a cover object.
    • Substitution – Content of a cover object is selectively replaced with the plain text.
    • Creation – No cover object is used. A purpose built single-use stego object is created for a specific plain text.
  7. What is the relationship between steganography and watermarking?
  8. What is the primary concept behind completely automated public Turing test to tell computers and humans apart (CAPTCHA)?
  9. Is a CAPTCHA a form of authentication? Why?
  10. What are the effects on authentication, security and privacy due to globalisation, outsourcing, software as a service and smaller electronic devices?
  11. Why is authentication important for commercial communications, transactions, brands and communities?


Relationship between different security methods