1 |
Checksums are well known and can be gotten by dividing message into 32 bit groups and anding these groups together.
-
This is designed for fault tolerance and ensures that data was not garbled in transmission
-
hashs (designed properly) cannot be inverted and represent a unique fingerprint of original message.
|
2 |
A secret checksum combines this process with a secret key and produces a MIC (message integrity code) which can be decoded and checked
|
3 |
This can be used with either a ciphertext or plaintext message and guarantees that information is stored or transmitted faithfully
|
4 |
Note encrypting a message does not guarantee that it is not changed!
|
5 |
MIC with plaintext is used by bank electronic fund transfer
|