Skip to main content
Top

2003 | OriginalPaper | Chapter

Hash Algorithms and Security Applications

Authors : Máire McLoone, John V. McCanny

Published in: System-on-Chip Architectures and Implementations for Private-Key Data Encryption

Publisher: Springer US

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

The security services required to guarantee a fully protected networking system are [76, 29]: Confidentiality - protecting the data from disclosure to unauthorised bodiesAuthentication - assuring that received data was indeed transmitted by the body identified as the sourceIntegrity - maintaining data consistency and ensuring that data has not been altered by unauthorised personsNon-repudiation - preventing the originator of a message from denying transmission

Metadata
Title
Hash Algorithms and Security Applications
Authors
Máire McLoone
John V. McCanny
Copyright Year
2003
Publisher
Springer US
DOI
https://doi.org/10.1007/978-1-4615-0043-8_5

Premium Partner