When is Authentication Needed?
Whenever Operations Exceed Risk Threshold
Privacy protection - Knowing whom you are dealing prior to disclosing “sensitive” data
User Authentication
- Knowing who your correspondent is
Transaction Integrity - Ensuring the message sent is the message received
Non-Repudiation
- Correspondent cannot deny conducting transaction
Confidentiality
- Only authorized persons can read the message