Abstract
When a packet is routed from the source to the destination, it is routed through many intermediate nodes. It is at the intermediate nodes where anyone at one of the machines that handle the packets could reassemble the packets that make up the EDI Interchange and could therefore read it, copy it, alter it, or delete it. In the case where an EDI Interchange is carried using the SMTP protocol, the case could arise where the message cannot be delivered to the final recipient, so that the message must be stored at an intermediate node. Once again, the message is susceptible to any number of security threats mentioned above.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Schmied, G. (1999). Cryptography and Key Management. In: High Quality Messaging and Electronic Commerce. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-59922-4_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-59922-4_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-64183-1
Online ISBN: 978-3-642-59922-4
eBook Packages: Springer Book Archive