NIST logo

Publication Citation: Guideline for the Use of Advanced Authentication Technology Alternatives

NIST Authors in Bold

Author(s): James Foti;
Title: Guideline for the Use of Advanced Authentication Technology Alternatives
Published: September 28, 1994
Abstract: This Guideline describes the primary alternative methods for verifying the identities of computer system users, and provides recommendations to Federal agencies and departments for the acquisition and use of technology which supports these methods. Although the traditional approach to authentication relies primarily on passwords, it is clear that password-only authentication often fails to provide an adequate level of protection. Stronger authentication techniques become increasingly more important as information processing evolves toward an open systems environment. Modern technology has produced authentication tokens and biometric devices which are reliable, practical, and cost-effective. Passwords, tokens, and biometrics can be used in various combinations to provide far greater assurance in the authentication process than can be attained with passwords alone.
Citation: NIST FIPS - 190
Keywords: computer security; cryptographic modules; cryptography; Federal Information Processing Standards Publication; telecommunication security
Research Areas: Federal Information Processing Standards
PDF version: PDF Document Click here to retrieve PDF version of paper (232KB)