Authentication Protocol
Identifying or validating username
with password is called authentication. However if the same password is sent
over the network intruder can gain access to the password. We will see some of
the protocols which we studied and some which we did not study during our
course work. Authorization is the process by which one determines whether a
principal is allowed to perform an operation. Authorization is usually
performed after the principal has been authenticated, and may be based on
information local to the verifier, or based on authenticated statements by others
[1].