Message Integrity and Message Authentication
#1

Message Integrity and Message Authentication
[attachment=15941]

MESSAGE INTEGRITY


The cryptography systems that we have studied so far provide secrecy, or confidentiality, but not integrity. However, there are occasions where we may not even need secrecy but instead must have integrity.

Topics discussed in this section

11.1 Document and Fingerprint
11.2 Message and Message Digest
11.3 Difference
11.4 Checking Integrity
11.5 Cryptographic Hash Function Criteria

Document and Fingerprint

One way to preserve the integrity of a document is through the use of a fingerprint. If Alice needs to be sure that the contents of her document will not be changed, she can put her fingerprint at the bottom of the document

Message and Message Digest

The electronic equivalent of the document and fingerprint pair is the message and digest pair.

Difference

The two pairs (document / fingerprint) and (message / message digest) are similar, with some differences. The document and fingerprint are physically linked together. The message and message digest can be unlinked separately, and, most importantly, the message digest needs to be safe from change.






Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: fingerprint based attendance system with feedback message project, demonstrate integrity job, send message using lpc2148, how to send message automatically by using gsm modem, sample of empression message in a training, social message by colgate toothpaste, message sequence chart example,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Authentication Schemes for Session Passwords using Color and Images computer girl 2 2,356 20-09-2013, 10:52 AM
Last Post: computer topic
Information Automated Authentication of Identity Documents Computer Science Clay 2 2,167 19-01-2013, 12:46 AM
Last Post: jellajagadish
  On the channel and signal crosscorrelation uplink and downlink of mobile UHFDTV with seminar class 2 2,047 10-01-2013, 05:30 PM
Last Post: Guest
Video Automated Authentication of Identity Documents computer science crazy 2 3,513 29-12-2012, 11:38 AM
Last Post: seminar details
  Opportunistic Routing for Wireless Ad Hoc and Sensor Networks: Present and Future seminar presentation 3 3,000 22-11-2012, 01:26 PM
Last Post: seminar details
  IMAGE AUTHENTICATION TECHNIQUES seminars report electronics seminars 6 8,553 15-11-2012, 12:24 PM
Last Post: seminar details
  Seminar Report on Image Authentication Techniques mechanical wiki 1 3,636 15-11-2012, 12:24 PM
Last Post: seminar details
  Moments and Channel Capacity of Single and Dual-Branch Receivers Over Weibull Fading computer girl 0 1,072 11-06-2012, 03:43 PM
Last Post: computer girl
  GPS And GSM Based Explosive Detector And Location Identifier For Mobiles seminar class 2 2,574 31-12-2011, 10:12 AM
Last Post: seminar addict
  Biometric Authentication System on Mobile Personal Devices seminar class 2 3,169 01-09-2011, 10:23 AM
Last Post: seminar addict

Forum Jump: