07.07.2023 Views

Implementing-cryptography-using-python

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHAPTER

7

Message Integrity

You should be comfortable at this stage with symmetric key cryptography. In

this chapter, you learn to generate message authentication codes to let message

recipients validate that the message they are receiving has not been tampered

with while it was in transit. In the context of message integrity, a hash function

is used to produce a fixed-length message digest from a variable-size message.

The most common message digests range in length from 160 to 512 bits. Any

alteration to the input message produces a dramatically different message digest.

The message digests help detect unauthorized alterations and message forgeries.

The principles you learn and develop here continue in the next chapter

as you explore public-key cryptography; throughout this chapter, you gain

cryptographic knowledge as you:

■■

Learn about Message Authentication Codes (MACs)

■■

Ensure that your signature is not compromised and does not get forged

■■

Explore how to make forgeries when someone else failed to protect their

signatures

■■

Explore sending encrypted data over nonsecure channels

Implementing Cryptography Using Python®, First Edition. Shannon W. Bray.

© 2020 John Wiley & Sons, Inc. Published 2020 by John Wiley & Sons, Inc.

199

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!