Basic HTML version of Foils prepared May 19 99

Foil 34 Message Integrity with Secret Key Cryptography

From Remarks on Internet and Java Security Basic Information Track Computational Science Course CPS616 -- Spring Semester 1999. by Geoffrey Fox, Mehmet Sen


1 Checksums are well known and can be gotten by dividing message into 32 bit groups and anding these groups together.
  • This is designed for fault tolerance and ensures that data was not garbled in transmission
  • hashes (designed properly) cannot be inverted and represent a unique fingerprint of original message.
2 A secret checksum combines this process with a secret key and produces a MIC (message integrity code) which can be decoded and checked
3 This can be used with either a ciphertext or plaintext message and guarantees that information is stored or transmitted faithfully
4 Note encrypting a message does not guarantee that it is not changed!
5 MIC with plaintext is used by bank electronic fund transfer

in Table To:


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Wed May 19 1999