Integrity and Authentication

Integrity and Authentication

Manuel Mogollon
Copyright: © 2008 |Pages: 30
ISBN13: 9781599048376|ISBN10: 159904837X|ISBN13 Softcover: 9781616927301|EISBN13: 9781599048390
DOI: 10.4018/978-1-59904-837-6.ch006
Cite Chapter Cite Chapter

MLA

Manuel Mogollon. "Integrity and Authentication." Cryptography and Security Services: Mechanisms and Applications, IGI Global, 2008, pp.122-151. https://doi.org/10.4018/978-1-59904-837-6.ch006

APA

M. Mogollon (2008). Integrity and Authentication. IGI Global. https://doi.org/10.4018/978-1-59904-837-6.ch006

Chicago

Manuel Mogollon. "Integrity and Authentication." In Cryptography and Security Services: Mechanisms and Applications. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-837-6.ch006

Export Reference

Mendeley
Favorite

Abstract

In this chapter, methods that can check if a message was modified are explained; this includes the Message Authentication Code (MAC), hash functions, and the Keyed-Hash Message Authentication Code (HMAC). Also discussed are ways to verify a sender’s identity by using digital signatures.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.