- Authentication mechanism helps to establish proof of identity.
- This process ensures that origin of an electronic document or message is correctly identified.
- If user C posed as user A and sent message to user B then how would user B will come to know that this message came from user C not from user A.
- If user C posed as user A and sent request of fund transfer to user B then user B might will think that request came from user A and he might transfer funds to user A. This type of attack is known as fabrication.
