Authentication method—Method for demonstrating knowledge of a secret. The quality of the
authentication method, its strength is determined by the cryptographic basis of the key
Architecture for Public-Key Infrastructure (APKI) Draft distribution service on which it is based.
A symmetric key based method, in which both entities share common authentication information,
is considered to be a weaker method than an asymmetric key based method, in which not all the
authentication information is shared by both entities.