Authentication Using Conventional Encryption Techniques