Cryptography An Introduction Continued : Shon Harris Cissp, 5 Edition
Cryptography An Introduction Continued : Shon Harris Cissp, 5 Edition
Cryptography An Introduction Continued : Shon Harris Cissp, 5 Edition
An Introduction
Continued…
Shon Harris
CISSP, 5th Edition
3.11 Message Integrity
Parity bits and cyclic redundancy check (CRC)
functions have been used in protocols to detect
modifications in streams of bits as they are passed
from one computer to another, but they can usually
detect only unintentional modifications.
The HMAC function does not involve getting the symmetric key
to the destination securely. That would have to happen through
one of the other technologies we have discussed already
(Diffie-Hellman and key agreement, or RSA and key exchange).
3.11.2 CBC-MAC
If a CBC-MAC is being used, the message is encrypted with a
symmetric block cipher in CBC mode, and the output of the final
block of ciphertext is used as the MAC.