5 advantages (and 1 disadvantage) of zero knowledge authentication

<span id="hs_cos_wrapper_name" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="text" >5 advantages (and 1 disadvantage) of zero knowledge authentication</span>

Nov 12

Nov 12

Big Data

As data breaches continue to make the headlines, better encryption is one of the ways to keep data safe and private in the data center. Learn about zero knowledge authentication and why you may want to make it a key component to your data center security protocol.

What is zero knowledge authentication?

As with most traditional online services, there's a data set somewhere with user passwords. Yet, despite its complex nature, zero knowledge authentication lets the user prove they possess information to another source, without revealing any of that information to the source, let alone anyone else. In other words, other than the keyholder, no one has the keys to access the protected data. This is important, because it solves the problem of getting information, like a password, intercepted and stolen when communicating over the internet, mobile networks, the IoT and more.

5 advantages of zero knowledge authentication

Zero knowledge authentication offers a host of advantages over most password and authentication tools and is applicable to a range of markets, including data capture/point of sale, retail banking and more. Zero knowledge authentication:

  1. Protects data from criminals, and in some cases, the government
  2. Replaces the risky nature of password-only authentication
  3. Keeps online payments and transactions safe
  4. Ensures the validity of blockchains
  5. Secures public cloud accounts

1 disadvantage of zero knowledge authentication

This disadvantage is a big one. Only the user has a copy of their password. If the user forgets or loses their password, or for businesses, the master password, all that data is lost—forever.

Learn more

Topics: Cloud, Data Center

big data in 2015
Click me

Trending Data Center Articles

Partnering for Big Data Profits Guide
data center security breach