Abstract
Considering the concept of authentication process and it’s species to explore modern methods of authentication used in computing. Identified three general types of authentication: authentication by knowledge, authentication by ownership and authentication by characteristic. Considered examples of authentication methods. Identified advantages and disadvantages of considered authentication methods, given the principles of each method, types of attacks on them, also suggested methods of decreasing of compromise level for considered authentication methods. Considered factors which influenced on choice of particular method of authentication. Basing on it made conclusions of applicability of each authentication method. Multifactor biometric authentication systems are currently the most promising for the organization of access to information systems, both in terms of facilities and in terms of security. The cost of such systems is still fairly high, so when deciding on the use of a particular type of authentication should be guided not only security concerns but also the question of the cost of the final solution.
Keywords
Authentication, password, token, biometrics, neural network, compromising.
Shibanov, S.V. and Karpushin D.A. (2015). Comparative analysis of modern methods of authentication. Software of systems in the industrial and social fields, 5 (1): 33-37.