OUTLINE•Approaches to Message Authentication•Secure Hash Functions and HMACSecure Hash Functions and HMAC•Public-Key Cryptography Principles•Public-Key Cryptography Algorithms•Digital SignaturesDigital Signatures•Key ManagementFabian Ng2
Authentication•Requirements - must be able to verify that:Requirements must be able to verify that:1. Message came from apparent source or author,2. Contents have not been altered,3. Sometimes, it was sent at a certain time or sequence.4 Msslitimtpt f 4. Message – a legitimate part of a transaction•Protection against active attack (falsification of data and transactions)Fabian Ng3
has intentionally blurred sections.
Sign up to view the full version.