answersLogoWhite

0


Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: The ospf routing protocol uses a mac rather than digital signatures to provide message integrity why do you think a mac was chosen over digital signatures?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What do you mean by Digital Signatures and Digital Money?

This article is about cryptographic signatures. For simple signatures in digital form, see Electronic signature.A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, such that the sender cannot deny having sent the message (authentication and non-repudiation) and that the message was not altered in transit (integrity). Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering.


What is the definition of data communication protocol?

A communications protocol is a system of digital message formats and rules for exchanging those messages in or between computing systems and in telecommunications.


Message confidentiality and message integrity?

When the message transferred from sender to receiver in not added, deleted or modifies by an external third parties, then that message represents the message integrity. Message confidentiality will be added when the message is not been viewed or noted by the unauthorized user. Message integrity and message confidentiality are related to each other. Without message confidentiality you cannot achieve message integrity and vice versa.


How is a digital signature useful?

A digital signature can be used to confirm the identity of the sender of a message. If the digital signature corresponds to what would be expected from the users public/private key pair, then there is reasonable assurance that they are the one who sent the message. Phishing messages are pretty much incapable of creating digital signatures that would stand up to inspection - and in fact, if they did use a digital signature using keys that were lodged with a certificate authority, it would greatly facilitate tracking them down and bringing them to justice.A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, and that it was not altered in transit. Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering.A digital signature scheme typically consists of three algorithms:A key generation algorithm that selects a private key at random from a set of possible private keys. The algorithm outputs the private key and a corresponding public key.A signing algorithm that, given a message and a private key, produces a signature.A signature verifying algorithm that, given a message, public key and a signature, either accepts or rejects the message's claim to authenticity.Two main properties are required. First, a signature generated from a fixed message and fixed private key should verify the authenticity of that message by using the corresponding public key. Secondly, it should be computationally infeasible to generate a valid signature for a party who does not possess the private key.Properly implemented, digital signatures can be used for legally binding agreements and for non-repudiation - proving who sent a message if they try to deny it.Checking the digital signature on a message can help differentiate between a legitimate message and a phishing message.


What is non repudiation in information assurance?

Non-repudiation ensures that a party cannot deny the validity of a contract or communication that they participated in. In information assurance, non-repudiation techniques such as digital signatures and audit trails are used to provide evidence of the sender's identity and the integrity of the message. This helps prevent disputes or misunderstandings by proving the origin and delivery of the data.


How Digital Signatures works?

public-private keys are used to pass sensitive information however it can also be used to provide authentication that a sender is who they say they are. It does not protect the contents of the message, it only proves it is from who it says its from. It provides authentication and integrity but does not provide confidentiality, data is sent as normal but acts like a normal signature we use on a letter. A digital signature works by creating a message digest which ranges from between a 128-bit and a 256-bit number which is generated by running the entire message through a hash algorithm. This generated number is then encrypted with the senders private key and added to the end of the message. When the recipient receives the message they run the message through the same hash algorithm and generate the message digest number. They then decrypt the signature using the senders public key and providing the two numbers match they know the message is from who it says its from AND that is has not been modified. A digital signature is basically a way to ensure that an electronic document (e-mail, spreadsheet, text file, etc.) is authentic. Authentic means that you know who created the document and you know that it has not been altered in any way since that person created it. Digital signatures rely on certain types of encryption to ensure authentication. Encryption is the process of taking all the data that one computer is sending to another and encoding it into a form that only the other computer will be able to decode. Authentication is the process of verifying that information is coming from a trusted source. These two processes work hand in hand for digital signatures.


Protocol to receive mails from server?

IMAP (internet message access protocol)


What are some cute text message signatures?

DontNeverChange


What is the vmtp?

versatile message transfer protocol is a transport protocol designed for distributed operating system


IMap is a form of what protocol?

IMAP stands for Internet message access protocol. It is an alternative protocol. It can be though of as a remote file server.


Does Simple Network Management Protocol have any types of message?

i want the answer for this question (i.e) is there any message types found in simple network management protocol


What is expand ICMP?

internet control message protocol