Message Integrity and Message Authentication
#1

Message Integrity and Message Authentication
[attachment=15941]

MESSAGE INTEGRITY


The cryptography systems that we have studied so far provide secrecy, or confidentiality, but not integrity. However, there are occasions where we may not even need secrecy but instead must have integrity.

Topics discussed in this section

11.1 Document and Fingerprint
11.2 Message and Message Digest
11.3 Difference
11.4 Checking Integrity
11.5 Cryptographic Hash Function Criteria

Document and Fingerprint

One way to preserve the integrity of a document is through the use of a fingerprint. If Alice needs to be sure that the contents of her document will not be changed, she can put her fingerprint at the bottom of the document

Message and Message Digest

The electronic equivalent of the document and fingerprint pair is the message and digest pair.

Difference

The two pairs (document / fingerprint) and (message / message digest) are similar, with some differences. The document and fingerprint are physically linked together. The message and message digest can be unlinked separately, and, most importantly, the message digest needs to be safe from change.






Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: secure message boards, operate home equipment by text message, message jn24 us, social message by toothpaste, semiar report on message queueion transformer, wireless message display using rf, vehicle gaseous fuel leakage detection and message passed using gsm,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Authentication Schemes for Session Passwords using Color and Images computer girl 2 2,394 20-09-2013, 10:52 AM
Last Post: computer topic
Information Automated Authentication of Identity Documents Computer Science Clay 2 2,187 19-01-2013, 12:46 AM
Last Post: jellajagadish
  On the channel and signal crosscorrelation uplink and downlink of mobile UHFDTV with seminar class 2 2,070 10-01-2013, 05:30 PM
Last Post: Guest
Video Automated Authentication of Identity Documents computer science crazy 2 3,539 29-12-2012, 11:38 AM
Last Post: seminar details
  Opportunistic Routing for Wireless Ad Hoc and Sensor Networks: Present and Future seminar presentation 3 3,019 22-11-2012, 01:26 PM
Last Post: seminar details
  IMAGE AUTHENTICATION TECHNIQUES seminars report electronics seminars 6 8,572 15-11-2012, 12:24 PM
Last Post: seminar details
  Seminar Report on Image Authentication Techniques mechanical wiki 1 3,658 15-11-2012, 12:24 PM
Last Post: seminar details
  Moments and Channel Capacity of Single and Dual-Branch Receivers Over Weibull Fading computer girl 0 1,089 11-06-2012, 03:43 PM
Last Post: computer girl
  GPS And GSM Based Explosive Detector And Location Identifier For Mobiles seminar class 2 2,587 31-12-2011, 10:12 AM
Last Post: seminar addict
  Biometric Authentication System on Mobile Personal Devices seminar class 2 3,193 01-09-2011, 10:23 AM
Last Post: seminar addict

Forum Jump: