Connected: An Internet Encyclopedia
6.3.3. Data Origin Authentication Mechanism

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1446
Up: 6. Security Considerations
Up: 6.3. Protocol Correctness
Prev: 6.3.2. Data Integrity Mechanism
Next: 6.3.4. Restricted Administration Mechanism

6.3.3. Data Origin Authentication Mechanism

6.3.3. Data Origin Authentication Mechanism

The data integrity mechanism requires the use of a secret value known only to communicating parties. By virtue of this mechanism and assumptions 1 and 2, the protocols explicitly prevent unauthorized modification of messages. Data origin authentication is implicit if the message digest value can be verified. That is, the protocols realize goal 2.


Next: 6.3.4. Restricted Administration Mechanism

Connected: An Internet Encyclopedia
6.3.3. Data Origin Authentication Mechanism