Authentication, From an Information Theoretic Perspective