answersLogoWhite

0


Best Answer

When the message transferred from sender to receiver in not added, deleted or modifies by an external third parties, then that message represents the message integrity.

Message confidentiality will be added when the message is not been viewed or noted by the unauthorized user. Message integrity and message confidentiality are related to each other. Without message confidentiality you cannot achieve message integrity and vice versa.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Message confidentiality and message integrity
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Differences Between Confidentiality and Authenticity?

confidentiality keeps the message private Integrity provides the assurance that message has not been altered


What are the security servics of cryptography?

Confidentiality, Integrity, Authentication, and Non-repudiationCryptography offers confidentiality and integrity of messages. Confidentiality ensures no one else can read your messages unless they have knowledge of the decryption key. Integrity is knowing the message is unaltered, and can be performed with either a trusted third party, hashing algorithm, or with public key cryptography.


Which key is used to encrypt data in an asymmetric encryption system?

This answer depends on who is sending the information in a secure manner. If confidentiality is required, then the public key of the receiver is used to encrypt the message. If integrity is desired then your private key would be used to encrypt the message.


WTLS ensures integrity through what device?

Message authentication codes


What is MAC scheme?

A MAC scheme, short for Message Authentication Code scheme, is a cryptographic technique used to verify the integrity and authenticity of a message. It involves generating a unique tag based on the message content and a secret key, which is then used to authenticate the message and detect any tampering. This provides assurance that the message has not been altered in transit.


Which identify the security services f cryptgraphy?

Cryptography provides security services such as confidentiality (encryption to hide information), integrity (ensuring data hasn't been tampered with), authentication (verifying the identity of parties), and non-repudiation (ensuring a sender cannot deny sending a message).


Why do you use Cryptography?

Cryptography is used to secure sensitive information by encoding it in such a way that unauthorized individuals cannot access or understand it. It helps protect data confidentiality, integrity, and authenticity in digital communications and transactions.


Fundamentals objectives of information?

Confidentiality Integrity Availability


Object of information security?

Confidentiality Integrity Availability


What are the services provided by IPSec?

Confidentiality and data integrity


What is the different kinds of message?

positive message or good message,negative message or bad message and neutral message.


Principles essential to a secure information systems?

All of the following are principles essential to a secure information system except: