CONTENTS

Introduction       
 1     Scope
 2     Normative references
        2.1     Identical Recommendations | International Standards
        2.2     Paired Recommendations | International Standards equivalent in technical content
        2.3     Additional references
 3     Definitions
 4     Abbreviations
 5     General discussion of authentication
        5.1     Basic concepts of authentication
        5.2     Aspects of authentication service
        5.3     Principles used in authentication
        5.4     Phases of authentication
        5.5     Trusted Third Party Involvement
        5.6     Types of principal
        5.7     Human user authentication
        5.8     Types of attack on authentication
 6     Authentication information and facilities
        6.1     Authentication information
        6.2     Facilities
 7     Characteristics of authentication mechanisms
        7.1     Symmetry/Asymmetry
        7.2     Use of cryptographic/Non-cryptographic techniques
        7.3     Types of authentication
 8     Authentication mechanisms
        8.1     Classification by vulnerabilities
        8.2     Initiation of transfer
        8.3     Use of authentication certificates
        8.4     Mutual authentication
        8.5     Summary of class characteristics
        8.6     Classification by configuration
 9     Interactions with other security services/mechanisms
        9.1     Access control
        9.2     Data integrity
        9.3     Data confidentiality
        9.4     Non-repudiation
        9.5     Audit      
Annex A – Human user authentication
Annex B – Authentication in the OSI Model
Annex C – Countering replay using unique numbers or challenges
Annex D – Protection against some forms of attack on authentication
Annex E – Bibliography
Annex F – Some specific examples of authentication mechanisms
Annex G – Authentication facilities outline