Connected: An Internet Encyclopedia
4.3.2.3 Step 3: Authentication and Encryption

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1421
Up: 4. Processing of Messages
Up: 4.3 Privacy Enhancement Message Transformations
Up: 4.3.2 Approach
Prev: 4.3.2.2 Step 2: Canonical Form
Next: 4.3.2.4 Step 4: Printable Encoding

4.3.2.3 Step 3: Authentication and Encryption

4.3.2.3 Step 3: Authentication and Encryption

Authentication processing is applicable to PEM message types ENCRYPTED, MIC-ONLY, and MIC-CLEAR. The canonical form is input to the selected MIC computation algorithm in order to compute an integrity check quantity for the message. No padding is added to the canonical form before submission to the MIC computation algorithm, although certain MIC algorithms will apply their own padding in the course of computing a MIC.

Encryption processing is applicable only to PEM message type ENCRYPTED. RFC 1423 defines the padding technique used to support encryption of the canonically-encoded message text.


Next: 4.3.2.4 Step 4: Printable Encoding

Connected: An Internet Encyclopedia
4.3.2.3 Step 3: Authentication and Encryption