Professional Documents
Culture Documents
MAC can provide message integrity and message authentication. has a drawback. It needs a symmetric key that must be establish between the sender and the receiver. digital signature on the other hand, can use a pair of asymmetric key (one public and a private key).
MAC
Public-key cryptography involves the use of asymmetric key algorithms. Asymmetric key algorithms used to create a mathematically related key pair. A secret Private key and a published Public key. Protects the confidentiality and integrity of a message. The message is Encrypted using the Public key, which can only be Decrypted using the Private key.
The electronics/equivalent of the document and finger print pair is the message and digest pair. To preserve the integrity of a message. The message is passed through an algorithm, called hash function. The hashed function creates a compressed image of the message that can be used as a fingerprint. For compatibility. For integrity. For efficiency.
Cryptographic protocol
Cryptographic protocol or Encryption protocol is an abstract or concrete protocol performing a securityrelated function and applies cryptographic methods. A cryptographic protocol usually incorporates at least some of these aspects: Key agreement or establishment. Entity authentication. Symmetric encryption and message authentication material construction. Secured application-level data transport. Non-repudiation methods.
FUTURE SCENARIO
Digital encryption of data is useful during storage and retrieval of medical history of patients involved in eHealth programs. The growth of e-commerce and the recent enactment of the Electronic Signatures in Global and National Commerce Act (E-Sign Act) has opened a new frontier. With this constant development key management is becoming an issue. Advancements in HotJava and JavaPlugin based technologies will maintain fluidity and flexibility in key management.