Spring 2007



FAQ

Preparation for Lecture 22

Read Sections B and C of chapter 11. Authentication of requests amounts to answering the question which principal is making the request. Almost any security policy requires an answer this question. Today we study mechanisms for authentication, which will lead us into cryptographic protocols.

Lecture Slides

Questions or comments regarding 6.033? Send e-mail to the 6.033 staff at or to the 6.033 TAs at

Top // 6.033 home // $Id: l-auth-sec.html,v 1.4 2007/05/17 17:06:21 benmv Exp $