Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

authentication protocol

Abbreviation(s) and Synonym(s):

None

Definition(s):

  A defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier.
Source(s):
NIST SP 800-63-2 under Authentication Protocol [Superseded]

  1. A well specified message exchange process between a claimant and a verifier that enables the verifier to confirm the claimant’s identity.
Source(s):
CNSSI 4009-2015

  2. A defined sequence of messages between a Claimant and a Verifier that demonstrates that the Claimant has possession and control of a valid token to establish his/her identity, and optionally, demonstrates to the Claimant that he or she is communicating with the intended Verifier.
Source(s):
CNSSI 4009-2015 (NIST SP 800-63-2)

  A defined sequence of messages between a claimant and a verifier that demonstrates that the claimant has possession and control of one or more valid authenticators to establish their identity, and, optionally, demonstrates that the claimant is communicating with the intended verifier.
Source(s):
NIST SP 800-63-3 under Authentication Protocol