Open In App

Authentication in Computer Network

Last Updated : 03 Oct, 2025
Comments
Improve
Suggest changes
Like Article
Like
Report

Authentication is the process of verifying the identity of a user or information. User authentication is the process of verifying the identity of a user when that user logs in to a computer system.

Authentication Methods

Operating Systems generally identify/authenticates users using the following 3 ways: Passwords, Physical identification, and Biometrics. These are explained below.

  1. Passwords: Password verification is the most common authentication method. Each user is assigned a username and password, which the system stores. During login, the entered credentials are compared with the stored ones if they match, access is granted; otherwise, it is denied.
  2. Physical Identification: This method uses machine-readable badges, cards, or smart cards for authentication. Often combined with a password (e.g., ATMs), it enhances security by requiring both factors. Smart cards can store passwords internally, reducing the need to save them on the system. However, losing the card poses a security risk.
  3. Biometrics: This method of authentication is based on the unique biological characteristics of each user such as fingerprints, voice or face recognition, signatures, and eyes.
  4. A scanner or other devices to gather the necessary data about the user.
  5. Software to convert the data into a form that can be compared and stored.
  6. A database that stores information for all authorized users.
  7. Facial Characteristics: Humans are differentiated on the basis of facial characteristics such as eyes, nose, lips, eyebrows, and chin shape.
  8. Fingerprints: Fingerprints are believed to be unique across the entire human population.
  9. Hand Geometry: Hand geometry systems identify features of the hand that includes the shape, length, and width of fingers.
  10. Retinal pattern: It is concerned with the detailed structure of the eye.
  11. Signature: Every individual has a unique style of handwriting, and this feature is reflected in the signatures of a person.
  12. Voice: This method records the frequency pattern of the voice of an individual speaker.

Types of Authentication

1. Single-Factor authentication: Single-Factor Authentication (SFA) is the earliest and simplest method of security, where a user provides a username and password to gain access. If either the username or password is incorrect, access is denied.

Advantages of Single-Factor Authentication (SFA)

  • Simple and straightforward to use
  • Low-cost implementation
  • Requires minimal technical knowledge from the user

Disadvantages of Single-Factor Authentication

  • It is not highly secure, as protection depends entirely on the strength of the user’s password.
  • The protection level in Single-Factor Authentication is much low.

2. Two-factor Authentication: In this authentication system, the user has to give a username, password, and other information. Some of the two factor authentication systems that are used by the user for securing the system are wireless tokens , virtual tokens, OTP and more.

Advantages of Two-Factor Authentication

  • Provides stronger security than Single-Factor Authentication by requiring an additional verification step
  • Protects against password theft, reducing risks of fraud and unauthorized access
  • Increases user confidence and trust in the system

Disadvantages of Two-Factor Authentication

  • It is time-consuming.

3. Multi-Factor authentication system: In this type of authentication, more than one factor of authentication is needed. This gives better security to the user. Any type of keylogger or phishing attack will not be possible in a Multi-Factor Authentication system. This assures the user, that the information will not get stolen from them.

The advantage of the Multi-Factor Authentication System are

  • No risk of security.
  • No information could get stolen.
  • No risk of any key-logger activity.
  • No risk of any data getting captured.

The disadvantage of the Multi-Factor Authentication System are

  • It is time-consuming.
  • it can rely on third parties.
  • The main objective of authentication is to allow authorized users to access the computer and to deny access to unauthorized users.

Explore