M.I.T. DEPARTMENT OF EECS

6.033 - Computer System Engineering Lecture 16 - Monday, April 5, 2004

Read Sections C and F of chapter 6. Authentication of requests amounts to answering the question which principal is making the request. Almost any security policy requires an answer this question. Today we study mechanisms for authentication, which will lead us into cryptographic protocols.


Go to 6.033 Home Page