Preparation for Lecture 22
Read Sections B and C of chapter 11. Authentication of requests
amounts to answering the question which principal is making the
request. Almost any security policy requires an answer this
question. Today we study mechanisms for authentication, which will
lead us into cryptographic protocols.
|