Denial of Service
An attacker might sabotage a network even if he cannot read or forge legitimate messages
- overloading a network (e.g, Internet MS-DOS)
- jamming a radio channel (e.g., Captain Midnight)
Limited role for crypto in a public network
- conditional access to resources, controls, etc