Authentication
From Erights
(Difference between revisions)
m (typo) |
|||
Line 1: | Line 1: | ||
== Definition == | == Definition == | ||
- | + | Given one end of a communication channel, authentication procedure establishes which principal | |
- | + | is probably at the other end. | |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
== Examples == | == Examples == | ||
- | * | + | * Authentication is important in connection with [http://en.wikipedia.org/wiki/Banknote Banknotes]. Paper money is useful only if it is not easily forgeable. In ideal case, it should be issued by a single trusted principal. The authentication can determine that this is the case. |
- | + | * Authentication enables us to determine that a given principal probably issued a given document. | |
+ | * Authentication enables us to determine that a given principal probably published a given program. |
Revision as of 09:14, 26 July 2009
Definition
Given one end of a communication channel, authentication procedure establishes which principal is probably at the other end.
Examples
- Authentication is important in connection with Banknotes. Paper money is useful only if it is not easily forgeable. In ideal case, it should be issued by a single trusted principal. The authentication can determine that this is the case.
- Authentication enables us to determine that a given principal probably issued a given document.
- Authentication enables us to determine that a given principal probably published a given program.