Abstract: A method for authenticating and logging-in a first user of a communication system to a second user is performed using hashing operations in such a manner that the first user's unique identifier is not stored on the first user's computer, and the second user's computer does not store information which allows a hacker gaining access thereto to assume the identity of the first user.