intTypePromotion=1

Authentication Methods: From Digital Signatures to Hashes

Chia sẻ: Nguyen Lan | Ngày: | Loại File: PPT | Số trang:33

0
40
lượt xem
3
download

Authentication Methods: From Digital Signatures to Hashes

Mô tả tài liệu
  Download Vui lòng tải xuống để xem tài liệu đầy đủ

We have looked at confidentiality services, and also examined the information theoretic framework for security. Confidentiality between Alice and Bob only guarantees that Eve cannot read the message, it does not address: Is Alice really talking to Bob? Is Bob really talking to Alice? In this lecture, we will look at the following problems: Entity Authentication: Proof of the identity of an individual Message Authentication: (Data origin authentication) Proof that the source of information really is what it claims to be Message Signing: Binding information to a particular entity Data Integrity: Ensuring that information has not been altered by unknown entities ...

Chủ đề:
Lưu

Nội dung Text: Authentication Methods: From Digital Signatures to Hashes

CÓ THỂ BẠN MUỐN DOWNLOAD

Đồng bộ tài khoản