Abstract
It is obviously important to encrypt a transmitted message, but how can it be proved that the user who originally encrypted the message sent the message. This is achieved with message authentication. The two users who are communicating are sometimes known as the principals. It should be assumed that an intruder (hacker) can intercept and listen to messages at any part of the communications, whether it be the initial communication between the two parties and their encryption keys or when the encrypted messages are sent. The intruder could thus playback any communications between the parties and pretend to be the other.
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Copyright information
© 1999 William Buchanan
About this chapter
Cite this chapter
Buchanan, W.J. (1999). Authentication. In: Mastering Networks. Macmillan Master Series. Palgrave, London. https://doi.org/10.1007/978-1-349-14966-7_20
Download citation
DOI: https://doi.org/10.1007/978-1-349-14966-7_20
Publisher Name: Palgrave, London
Print ISBN: 978-0-333-74804-6
Online ISBN: 978-1-349-14966-7
eBook Packages: Palgrave Business & Management CollectionBusiness and Management (R0)