2.8.2 Authentication

Common approach: Passwords. Shared secret between two parties. Since only I know password, machine can assume it is me.

Problem 1 system must keep copy of secret, to check against password. What if malicious user gains access to this list of passwords?

Encryption Transformation on data that is difficult to reverse - in particular, secure digest functions.



Subsections
Ian Wakeman 2005-02-22