5
Entity Authentication
In Chapter 2, Secure Channel and the CIA Triad, we saw that Alice and Bob need the CIA triad – the combination of the cryptographic goals confidentiality, integrity, and authentication – to establish a secure communication channel in the presence of both passive and active attackers. We defined what authentication is, gave several examples illustrating what happens when authentication goes wrong, and briefly discussed the two types of authentication used in cryptography, namely message authentication and entity authentication.
In this chapter, we are going to cover authentication – in particular entity authentication – in much more detail. Particularly, we will discuss the following:
Why entity authentication is absolutely ...
Get TLS Cryptography In-Depth now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.