M.I.T. DEPARTMENT OF EECS

6.033 - Computer System Engineering Lecture 22 - Wednesday, April 27, 2005

Read Section B of chapter 11. Authentication of requests amounts to answering the question which principal is making the request. Almost any security policy requires an answer this question. Today we study mechanisms for authentication, which will lead us into cryptographic protocols.


Go to 6.033 Home Page