6.033 - Computer System Engineering | Lecture 22 - Wednesday, April 27, 2005 |
Read Section B of chapter 11. Authentication of requests amounts to answering the question which principal is making the request. Almost any security policy requires an answer this question. Today we study mechanisms for authentication, which will lead us into cryptographic protocols.