Question

What kind of requirements need to be achieved for massage authentication? What kind of methods are...

What kind of requirements need to be achieved for massage authentication? What kind of methods are normally used to achieve such requirements?

Homework Answers

Answer #1

Message authentication is a way of verifying the received messages, whether they are from an alleged source or whether the messages are altered or not.

Requirements:

  1. Disclosure - the release of message contents to a person or process not containing the proper cryptographic key.
  2. Traffic analysis - determining the frequency and duration of connection in a connection-oriented application or the length of messages between parties in a connection-less application.
  3. Content modification - changing the contents of a message.
  4. Timing modification - delayed or replayed messages.
  5. Source repudiation - denial of transmission of a message by source.
  6. Destination repudiation - denial of transmission of a message by destination.

Methods:

One of the methods includes a digital signature, an authentication technique that measures for counter check the source and destination.

Other methods could be using Message Authentication Code (MAC). MAC generated by an algorithm, the receiver performs computation on the message and checks whether it matches the MAC, for which the sender assures that the message was unaltered and comes from the sender.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Two-factor authentication methods are becoming widely used. Generate a two-factor authentication process that would use biometrics...
Two-factor authentication methods are becoming widely used. Generate a two-factor authentication process that would use biometrics as one of the factors.
What is the difference between authentication and authorization? need to be 270 word in the explanation
What is the difference between authentication and authorization? need to be 270 word in the explanation
What kind of accomodations do children that are deaf or hard at hearing need in a...
What kind of accomodations do children that are deaf or hard at hearing need in a classroom in order to succed? Explain.
What methods are used to achieve low levels of corrosion by oxygen in boiler feed water?...
What methods are used to achieve low levels of corrosion by oxygen in boiler feed water? What measurements are essential to ensure that this is done satisfactorily, and what types of measurement could be used?
b) What methods are used to achieve low levels of corrosion by oxygen in boiler feed...
b) What methods are used to achieve low levels of corrosion by oxygen in boiler feed water? What measurements are essential to ensure that this is done satisfactorily, and what types of measurement could be used?
Having a hard time deciding what kind of project to go with, if someone could provide...
Having a hard time deciding what kind of project to go with, if someone could provide skeleton code for the pom.xml and the JUnit testers and JUnit Suite Create your own project that utilizes Maven and JUnit Testing with your own classes. You will create the classes and tests. You do not have to have an interface for your class. In order to achieve a 50/50, your project should minimally demonstrate: Maven support with a pom.xml and appropriate dependency/dependencies A...
What kind of information Load test results provide on pile type? Need explanation and step by...
What kind of information Load test results provide on pile type? Need explanation and step by step solution and without plagrism
What kind of lens (type and focal length) would you need to place next to a...
What kind of lens (type and focal length) would you need to place next to a converging lens of focal length 25cm to create a converging lens with a focal length of 40cm?
Reaching an agreement on a set of requirements is very critical for any software project. This...
Reaching an agreement on a set of requirements is very critical for any software project. This set of approved requirements is called the requirements baseline. In 1–2 paragraphs, explain what you need to go through until you can baseline a set of requirements and how can you do this baselining for agile projects. Include the following in your answer: The different stakeholders that need to be involved Customers or end users Developers Testers Management The main considerations for these different...
International economics Questions 1.What explain the “ Prebish –Singer hypothesis? 2.   What kind of methods developing...
International economics Questions 1.What explain the “ Prebish –Singer hypothesis? 2.   What kind of methods developing countries can use to reverse the decline of their term of trade? 3.   How important is export instability, and , therefore, how important is the maintenance of buffer stocks? 4.   Illustrate graphically the economic effects of an export tax. 5.   Explain what the terms of trade argument for protection is about? Is this a valid argument? 6. Compare and contrast the “Washington consensus” and...