4 DataSecurity 4
4 DataSecurity 4
This shows the complex process that's required to send data three basic tenets of secure transfer: data encryption,
securely across open communication lines while satisfying the interference prevention, and user authentification.
Message- Message-
digest authentication
Public
Sender function code 2 The sender encrypts
the MAC with their
1 The sender takes a document and produces a message- private key.
authentication code (MAC) using a message-digest function.
3 The sender attaches the encrypted MAC to the document 4 When the recipient receives the document,
and encrypts both with the recipient's public key. they can decrypt it with their private key.
Sender
Recipient
Recipient 7 The recipient compares its local copy of the MAC to the
sender's unencrypted MAC. If the two match, then the recipient
6 The recipient decrypts the sender's knows the document hasn't been tampered with and that only
MAC using the sender's public key. the sender could have created the original message.
UNIT 18 Data Security 1 131
B1:
a- iv b- iii c- i d-ii
B2:
a- iii b- iv c- vi d- i e- ii f- v