{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

chapter4-1 - Chapter 4 Cryptographic hash function 1 Data...

Info icon This preview shows pages 1–11. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Chapter 4 Cryptographic hash function
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
2 Need a way to ensure that data arrives at destination in its original form as sent by the sender Data Integrity
Image of page 2
3 Data Integrity and Hash function Data integrity: data are intact during the period of storage or transmission Two possibilities of losing data integrity error occurs during transmission modified by attacker during storage or transmission Solutions to them error detection/correction, such as CRC (Cyclic Redundancy Code) in every IP packet Hash function, Message digest, or Message authentication code (MAC)
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon