previous | start | next

Authentication

This is the technique by which a process verifies that its communication partner is who it is believed to be and not an imposter.
 

 
Two parties who wish to communicate securely can use public key cryptography to establish a session key, useful for a single transaction. This is useful since single key cryptography is much faster than public key cryptography.
 


previous | start | next