Message Integrity and Message Authentication
#1

Message Integrity and Message Authentication
[attachment=15941]

MESSAGE INTEGRITY


The cryptography systems that we have studied so far provide secrecy, or confidentiality, but not integrity. However, there are occasions where we may not even need secrecy but instead must have integrity.

Topics discussed in this section

11.1 Document and Fingerprint
11.2 Message and Message Digest
11.3 Difference
11.4 Checking Integrity
11.5 Cryptographic Hash Function Criteria

Document and Fingerprint

One way to preserve the integrity of a document is through the use of a fingerprint. If Alice needs to be sure that the contents of her document will not be changed, she can put her fingerprint at the bottom of the document

Message and Message Digest

The electronic equivalent of the document and fingerprint pair is the message and digest pair.

Difference

The two pairs (document / fingerprint) and (message / message digest) are similar, with some differences. The document and fingerprint are physically linked together. The message and message digest can be unlinked separately, and, most importantly, the message digest needs to be safe from change.






Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: moing message display using 8051 project report, kalvisolai message, automatic message sending and attendance, message deleted, message conversion tool ppt, configure message service blackberry bold, mcs message conversion system,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Authentication Schemes for Session Passwords using Color and Images computer girl 2 2,424 20-09-2013, 10:52 AM
Last Post: computer topic
Information Automated Authentication of Identity Documents Computer Science Clay 2 2,210 19-01-2013, 12:46 AM
Last Post: jellajagadish
  On the channel and signal crosscorrelation uplink and downlink of mobile UHFDTV with seminar class 2 2,101 10-01-2013, 05:30 PM
Last Post: Guest
Video Automated Authentication of Identity Documents computer science crazy 2 3,565 29-12-2012, 11:38 AM
Last Post: seminar details
  Opportunistic Routing for Wireless Ad Hoc and Sensor Networks: Present and Future seminar presentation 3 3,055 22-11-2012, 01:26 PM
Last Post: seminar details
  IMAGE AUTHENTICATION TECHNIQUES seminars report electronics seminars 6 8,629 15-11-2012, 12:24 PM
Last Post: seminar details
  Seminar Report on Image Authentication Techniques mechanical wiki 1 3,688 15-11-2012, 12:24 PM
Last Post: seminar details
  Moments and Channel Capacity of Single and Dual-Branch Receivers Over Weibull Fading computer girl 0 1,105 11-06-2012, 03:43 PM
Last Post: computer girl
  GPS And GSM Based Explosive Detector And Location Identifier For Mobiles seminar class 2 2,599 31-12-2011, 10:12 AM
Last Post: seminar addict
  Biometric Authentication System on Mobile Personal Devices seminar class 2 3,213 01-09-2011, 10:23 AM
Last Post: seminar addict

Forum Jump: