January 8, 2002
Practical Aspects of Modern
Cryptography
Authentication
•Should Alice be happy with this method of authentication?
•
•Bob sends Alice the
authentication string y = “I owe Bob $1,000,000 - signed
Alice.”
•
•Alice dutifully
authenticates herself by decrypting (putting her signature on) y.