O'Reilly logo

Applied Enterprise JavaBeans™ Technology by Kevin Boone

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

G.3. Detecting tampering

Asymmetric cryptography makes it almost impossible for an unauthorized person to eavesdrop on communication (provided that the private keys are kept safe and are not easy to guess).

However, if an impostor knows the recipient’s public key (which is very likely), then he can use it to insert spurious data in the communication between the sender and the recipient (assuming that the impostor has physical access to the data). We would, of course, like to prevent this, or at least to detect that it has occurred.

A simple approach would be for the sender to take a simple checksum of the data and transmit it along with the data itself. The recipient could also derive its own version of the checksum and compare it with the transmitted ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required