Chapter 4Data Authentication

Data authentication has two purposes: certify the origin of the data and convince the user that the data has not been modified or fabricated. Data authentication is a critical mechanism to maintain data integrity and nonrepudiation. Data authentication may be achieved either using conventional encryption algorithms or using public-key cryptography.

Suppose that Alice and Bob share a common secret key c04-math-0001. Alice wants to send a data string c04-math-0002 to Bob and convince Bob that c04-math-0003 does indeed come from her without being modified during transmission. This can be done as follows: Alice sends c04-math-0004 together with c04-math-0005 to Bob, where c04-math-0006 and c04-math-0007 is a conventional encryption algorithm agreed on by Alice and Bob. Because only Alice and Bob know , Bob can use to decrypt to get . Bob will be convinced ...

Get Introduction to Network Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.