This document discusses user authentication and host-to-host authentication. It describes several methods of user authentication including passwords, one-time passwords, smart cards, and biometrics. It also discusses network-based authentication and cryptographic techniques for host-to-host authentication, noting that cryptographic authentication provides stronger authentication but requires solutions to issues like securing the key distribution center and protecting hosts' cryptographic keys.