Integrity and Authentication

Integrity and Authentication

Manuel Mogollon (University of Dallas, USA)
Copyright: © 2008 |Pages: 30
DOI: 10.4018/978-1-59904-837-6.ch006


In this chapter, methods that can check if a message was modified are explained; this includes the Message Authentication Code (MAC), hash functions, and the Keyed-Hash Message Authentication Code (HMAC). Also discussed are ways to verify a sender’s identity by using digital signatures.

Complete Chapter List

Search this Book: