IntroductionThe previous chapter discussed the message digest. Recall that the original digest needs to be trusted to be valid in order for the receiver to validate its digest. Also, recall that I mentioned a way to protect the access to the original digest is to set up a secure database and allow minimum access to it. Another way to protect the digest is by using a secret key called the message authentication code (MAC), which is discussed in this chapter. A third way is to protect the digest by a key pair. Some of these methods can be used together. For instance, digests that are generated with a secret key could be stored in a secure file system and periodically verified with a secret key to check whether there has been tampering.
Java Security Solutions ISBN: 0764549286
EAN: 2147483647 Year: 2001
Pages: 222 Authors: Rich Helton, Johennie Helton
flylib.com © 2008-2017. If you may any questions please contact us: flylib@qtcs.net |