Who are you?
- Many attacks on computer security consist of the attacker pretending to be someone else
- In the physical world we establish our identity with documents, photographs, fingerprints; none of these work over the network
- What we need is a kind of signature which can be sent over the network and which is almost impossible to forge