Hasil (
Bahasa Indonesia) 1:
[Salinan]Disalin!
Message Authentication without Message EncryptionIn this section, we examine several approaches to message authentication that donot rely on message encryption. In all of these approaches, an authentication tagis generated and appended to each message for transmission. The message itself isnot encrypted and can be read at the destination independent of the authenticationfunction at the destination.Because the approaches discussed in this section do not encrypt the message,message confidentiality is not provided. As was mentioned, message encryption byitself does not provide a secure form of authentication. However, it is possible tocombine authentication and confidentiality in a single algorithm by encrypting amessage plus its authentication tag. Typically, however, message authenti cation isprovided as a separate function from message encryption. [DAVI89] suggests threesituations in which message authentication without confidentiality is preferable:1. There are a number of applications in which the same message is broadcast to anumber of destinations. Two examples are notification to users that the networkis now unavailable, and an alarm signal in a control center. It is cheaper andmore reliable to have only one destination responsible for monitoring authenticity.Thus, the message must be broadcast in plaintext with an associated messageauthentication tag. The responsible system performs authentication. If a violationterjadi, sistem tujuan lain diperingatkan oleh umum alarm.2. lain mungkin skenario adalah pertukaran di mana satu sisi memiliki beban beratdan tidak mampu waktu untuk mendekripsi semua pesan masuk. Otentikasidilakukan secara selektif, dengan pesan yang dipilih secara acak untukmemeriksa.3. otentikasi dari program komputer di plaintext adalah layanan menarik.Program komputer yang bisa dilaksanakan tanpa harus melakukan dekripsi setiapwaktu, yang akan menjadi sia-sia sumber daya prosesor. Namun, jika pesanotentikasi tag yang melekat pada program, itu bisa memeriksa setiap kalijaminan diperlukan integritas program.
Sedang diterjemahkan, harap tunggu..