Spring 2006



FAQ

Preparation for Lecture 22

Read Sections B and C of chapter 11. Authentication of requests amounts to answering the question which principal is making the request. Almost any security policy requires an answer this question. Today we study mechanisms for authentication, which will lead us into cryptographic protocols.

Questions or comments regarding 6.033? Send e-mail to the 6.033 staff at or to the 6.033 TAs at

Top // 6.033 home // $Id: l-auth-sec.html,v 1.3 2006/04/25 19:40:23 rseater Exp $