IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Integrity and Authentication

Integrity and Authentication
View Sample PDF
Author(s): Manuel Mogollon (University of Dallas, USA)
Copyright: 2008
Pages: 30
Source title: Cryptography and Security Services: Mechanisms and Applications
Source Author(s)/Editor(s): Manuel Mogollon (University of Dallas, USA)
DOI: 10.4018/978-1-59904-837-6.ch006

Purchase

View Integrity and Authentication on the publisher's website for pricing and purchasing information.

Abstract

In this chapter, methods that can check if a message was modified are explained; this includes the Message Authentication Code (MAC), hash functions, and the Keyed-Hash Message Authentication Code (HMAC). Also discussed are ways to verify a sender’s identity by using digital signatures.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom