Skip to main content

Authentication

  • Chapter
Mastering Networks

Part of the book series: Macmillan Master Series ((PMSC))

  • 58 Accesses

Abstract

It is obviously important to encrypt a transmitted message, but how can it be proved that the user who originally encrypted the message sent the message. This is achieved with message authentication. The two users who are communicating are sometimes known as the principals. It should be assumed that an intruder (hacker) can intercept and listen to messages at any part of the communications, whether it be the initial communication between the two parties and their encryption keys or when the encrypted messages are sent. The intruder could thus playback any communications between the parties and pretend to be the other.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Author information

Authors and Affiliations

Authors

Copyright information

© 1999 William Buchanan

About this chapter

Cite this chapter

Buchanan, W.J. (1999). Authentication. In: Mastering Networks. Macmillan Master Series. Palgrave, London. https://doi.org/10.1007/978-1-349-14966-7_20

Download citation

Publish with us

Policies and ethics