2003 | OriginalPaper | Chapter
Hash Algorithms and Security Applications
Authors : Máire McLoone, John V. McCanny
Published in: System-on-Chip Architectures and Implementations for Private-Key Data Encryption
Publisher: Springer US
Included in: Professional Book Archive
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
The security services required to guarantee a fully protected networking system are [76, 29]: Confidentiality - protecting the data from disclosure to unauthorised bodiesAuthentication - assuring that received data was indeed transmitted by the body identified as the sourceIntegrity - maintaining data consistency and ensuring that data has not been altered by unauthorised personsNon-repudiation - preventing the originator of a message from denying transmission