Identification should include
asymmetric encryption
symmetric encryption
one-way hash
salting.