2.8.3 Authentication in distributed systems: Private Key Encryption

In distributed systems, the network between the machine on which the password is typed and the machine the password is authenticating on is accessible to everyone.

Two roles for encryption:

  1. Authentication - do we share the same secret?
  2. Secrecy - I don't want anyone to know this data (eg medical records)

Use an encryption algorithm that can easily be reversed given the correct key, and difficult to reverse without the key

\includegraphics[]{figs/private}



Subsections
Ian Wakeman 2005-02-22