6.033 - Computer System Engineering | Lecture 16 - Monday, April 5, 2004 |
Read Sections C and F of chapter 6. Authentication of requests amounts to answering the question which principal is making the request. Almost any security policy requires an answer this question. Today we study mechanisms for authentication, which will lead us into cryptographic protocols.