Chapter 10: Ensuring Message Authentication

  

Introduction

The previous chapter discussed the message digest. Recall that the original digest needs to be trusted to be valid in order for the receiver to validate its digest. Also, recall that I mentioned a way to protect the access to the original digest is to set up a secure database and allow minimum access to it. Another way to protect the digest is by using a secret key called the message authentication code (MAC), which is discussed in this chapter. A third way is to protect the digest by a key pair. Some of these methods can be used together. For instance, digests that are generated with a secret key could be stored in a secure file system and periodically verified with a secret key to check whether there has been tampering.

Cross-Reference  

The key exchange methods are discussed in Chapter 7.

  


Java Security Solutions
Java Security Solutions
ISBN: 0764549286
EAN: 2147483647
Year: 2001
Pages: 222

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net