Spring 2008





Preparation for Lecture 22

Read Sections B and C of chapter 11. Authentication of requests amounts to answering the question of which principal is making the request. Almost any security policy requires an answer to this question. Today we study mechanisms for authentication, which will lead us into cryptographic protocols.

Lecture Slides

Questions or comments regarding 6.033? Send e-mail to the 6.033 staff at or to the 6.033 TAs at

Top // 6.033 home // $Revision: 234 $, last modified on $Date: 2008-04-25 16:34:16 -0400 (Fri, 25 Apr 2008) $ GMT by $Author: cowling $