Introduction
Imagine you want to keep your personal diary safe so only you can read it. Computers face a similar challenge: they need to make sure only the right people can access certain information or systems. User authentication mechanisms solve this problem by checking who you are before letting you in.