AuthN
User Identification Flow
Give Authority After Authentication
Authentication methods present a challenging balance between security and user experience
Information that proves the identity of a principal
- What you know
- What you possess
- What you are
- Where you are
3 Parts to User Authentication: Registration → Authentication check → Recover
Practical multi-factor authentication
- Biometrics (Identity Hardware)
- Password (Key-Value memory software)
- Hardware Authentication (External Hardware)
Authentication Notion
Authentication Usages
History
Passwordless: a different kind of hell?
It's no secret that authenticating into services is an unresolved topic. With time, we have managed to make them more secure, but that was at the expense of user experience. The new generation of mail codes and authenticator apps has moved us from the ease of one-click browser autocomplete to complex ordeals involving multiple steps and sometimes multiple devices.
https://jcarlosroldan.com/post/315/passwordless-a-different-kind-of-hell

High Level Authentication Notion
고수준에서 암호학 이해하기
이 글은 메아리 저널 에 쓸 목적으로 한동안 작업하던 글입니다. 메아리 특유의 디자인(...)이 싫다면 여기로 링크하셔도 됩니다. 어느 쪽이든간에 의견은 이 아래의 코멘트 란 또는 메아리에 기재되어 있는 메일 주소를 써 주시면 감사하겠습니다. --lifthrasiir 암호학을 사용하는 많은 시스템은 세부적으로 무슨 알고리즘을 쓰는지보다는 그 알고리즘들이 어떻게 연결되어 있는지, 즉 구조가 실제 안전성에 더 큰 영향을 미친다.
https://gist.github.com/aJchemist/f2d08f328f0458be8ee8#authenticated-encryption


Seonglae Cho