Integrated Security System
When two parties communicate …
- Their software usually handles the details
- First, negotiate security methods
- Then, authenticate one another
- Then, exchange symmetric session key
- Then can communicate securely using symmetric session key and message-by-message authentication