Identification should include
asymmetric encryption
symmetric encryption
secure hashing
salted hashes.