Summary

  

This chapter presented a discussion on how a message can be authenticated and the data in the message verified . The validation is done through the combination of a secret key and a message digest. The secret key is digested in between the actual message input. Only those users who pass in the same secret key can get the same digest, otherwise the data is considered compromised. If different data or a different key is passed in, the digest produced is different. Some algorithms discussed in the previous chapter do produce collisions. Collisions occur when multiple messages can produce the same digest. MD5 is known to produce collisions, but is still considered by most as a valid algorithm to use. The algorithms used should be considered carefully . The HMAC classes are wrappers around a generic interface into the message digest that will use a secret key as part of the digest.

  


Java Security Solutions
Java Security Solutions
ISBN: 0764549286
EAN: 2147483647
Year: 2001
Pages: 222

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net