Preparation for Lecture 22
Read Sections B and C of chapter 11. Authentication of requests
amounts to answering the question of which principal is making the
request. Almost any security policy requires an answer to this
question. Today we study mechanisms for authentication, which will
lead us into cryptographic protocols.
Lecture Slides
|