AAP logoAAP logo
< GO BACK
placeholder

Encryption and decryption

LinkedIn

Encryption and decryption address the problem of eavesdropping, one of the three Internet security issues mentioned at the beginning of this document. But encryption and decryption, by themselves, do not address another problem: tampering.

This section describes how public-key cryptography addresses the problem of tampering.

Tamper detection and related authentication techniques rely on a mathematical function called a one-way hash (also called a message digest). A one-way hash is a number of fixed length with the following characteristics:

  • The value of the hash is unique for the hashed data. Any change in the data, even deleting or altering a single character, results in a different value.
  • The content of the hashed data cannot, for all practical purposes, be deduced from the hash-which is why it is called "one-way."

 

Posted by: rupali
Comments

Please sign in to participate in the conversation.

1 Comments
Posted ByLorell Sandi
Message
loading