January 8, 2002
Practical Aspects of Modern Cryptography
Authentication
•Should Alice be happy with this method of authentication?
•
•Bob sends Alice the authentication string       y = “I owe Bob $1,000,000 - signed Alice.”
•
•Alice dutifully authenticates herself by decrypting (putting her signature on) y.