Security in Computer Networks

8.3.1 Authentication Protocol ap1.0

Home | Introduction | 8.1 What Is Network Security? | 8.2 Principles of Cryptography | 8.3 Authentication | 8.4 Integrity | 8.5 Key Distribution and Certification | 8.6 Access Control: Firewalls | 8.7 Attacks and Countermeasures | 8.8 Security in Many Layers: Case Studies

Perhaps the simplest authentication protocol we can imagine is one where you simply send a message to someone stating your name.  The flaw here is obvious--there is no way for them to actually know that the person sending the message is you.

kurose_320719_c08f07.gif