Message Integrity and Message Authentication
#1

Message Integrity and Message Authentication
[attachment=15941]

MESSAGE INTEGRITY


The cryptography systems that we have studied so far provide secrecy, or confidentiality, but not integrity. However, there are occasions where we may not even need secrecy but instead must have integrity.

Topics discussed in this section

11.1 Document and Fingerprint
11.2 Message and Message Digest
11.3 Difference
11.4 Checking Integrity
11.5 Cryptographic Hash Function Criteria

Document and Fingerprint

One way to preserve the integrity of a document is through the use of a fingerprint. If Alice needs to be sure that the contents of her document will not be changed, she can put her fingerprint at the bottom of the document

Message and Message Digest

The electronic equivalent of the document and fingerprint pair is the message and digest pair.

Difference

The two pairs (document / fingerprint) and (message / message digest) are similar, with some differences. The document and fingerprint are physically linked together. The message and message digest can be unlinked separately, and, most importantly, the message digest needs to be safe from change.






Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: message send to network portaibility, atmega8 moving message, java message service book, deliver a message for the new academic, dynamic moving message, message rea, vehicle gaseous fuel leakage detection and message passed using gsm,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Authentication Schemes for Session Passwords using Color and Images computer girl 2 2,371 20-09-2013, 10:52 AM
Last Post: computer topic
Information Automated Authentication of Identity Documents Computer Science Clay 2 2,176 19-01-2013, 12:46 AM
Last Post: jellajagadish
  On the channel and signal crosscorrelation uplink and downlink of mobile UHFDTV with seminar class 2 2,056 10-01-2013, 05:30 PM
Last Post: Guest
Video Automated Authentication of Identity Documents computer science crazy 2 3,527 29-12-2012, 11:38 AM
Last Post: seminar details
  Opportunistic Routing for Wireless Ad Hoc and Sensor Networks: Present and Future seminar presentation 3 3,006 22-11-2012, 01:26 PM
Last Post: seminar details
  IMAGE AUTHENTICATION TECHNIQUES seminars report electronics seminars 6 8,562 15-11-2012, 12:24 PM
Last Post: seminar details
  Seminar Report on Image Authentication Techniques mechanical wiki 1 3,646 15-11-2012, 12:24 PM
Last Post: seminar details
  Moments and Channel Capacity of Single and Dual-Branch Receivers Over Weibull Fading computer girl 0 1,079 11-06-2012, 03:43 PM
Last Post: computer girl
  GPS And GSM Based Explosive Detector And Location Identifier For Mobiles seminar class 2 2,578 31-12-2011, 10:12 AM
Last Post: seminar addict
  Biometric Authentication System on Mobile Personal Devices seminar class 2 3,186 01-09-2011, 10:23 AM
Last Post: seminar addict

Forum Jump: