Professional Documents
Culture Documents
Everyday Cryptography - 1.3
Everyday Cryptography - 1.3
3 SECURITY SERVICES
11
1 BASIC PRINCIPLES
It is important to recognise that these basic security services are all essentially
different, even though on rst encounter they may seem similar. The following
statements further illustrate this.
12
1.3 SECURITY SERVICES
that we do know the source of the voice data. This, though, is not an example
of data origin authentication without data integrity. Even if the speakers voice is
recognisable, since an attacker could be inserting noise into the broken message
signal we cannot be certain that all the data we receive has come from the speaker
whose voice we recognise. Data origin authentication must apply to the entire
received message, not just parts of it.
Note that in almost all environments where we wish to detect deliberate
modication of data, we will require data origin authentication. The weaker notion
of data integrity without data origin authentication is normally only required in
situations where the sole integrity concern is accidental modication of data.
13
1 BASIC PRINCIPLES
14