Connected: An Internet Encyclopedia
6.3.3. Data Origin Authentication Mechanism
Up:
Connected: An Internet Encyclopedia
Up:
Requests For Comments
Up:
RFC 1446
Up:
6. Security Considerations
Up:
6.3. Protocol Correctness
Prev: 6.3.2. Data Integrity Mechanism
Next: 6.3.4. Restricted Administration Mechanism
6.3.3. Data Origin Authentication Mechanism
6.3.3. Data Origin Authentication Mechanism
The data integrity mechanism requires the use of a secret
value known only to communicating parties. By virtue of this
mechanism and assumptions 1 and 2, the protocols explicitly
prevent unauthorized modification of messages. Data origin
authentication is implicit if the message digest value can be
verified. That is, the protocols realize goal 2.
Next: 6.3.4. Restricted Administration Mechanism
Connected: An Internet Encyclopedia
6.3.3. Data Origin Authentication Mechanism