If the hash is transmitted over a different, protected channel, it can also protect the message against modifications. For MACs, a recipient must be confident that the shared symmetric key has only been shared with the sender.Ī (unkeyed) hash of the message, if appended to the message itself, only protects against accidental changes to the message (or the hash itself), as an attacker who modifies the message can simply calculate a new hash and use it instead of the original one. For digital signatures, a recipient must be confident that the verification key actually belongs to the sender. ![]() ![]() Please remember that authentication without confidence in the keys used is useless.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |