Professional Documents
Culture Documents
1.3 Security Services PDF
1.3 Security Services PDF
3 SECURITY SERVICES
11
1 BASIC PRINCIPLES
It is important to recognise that these basic security services are all essentially
different, even though on first encounter they may seem similar. The following
statements further illustrate this.
12
1.3 SECURITY SERVICES
that we do know the source of the voice data. This, though, is not an example
of data origin authentication without data integrity. Even if the speaker’s voice is
recognisable, since an attacker could be inserting noise into the broken message
signal we cannot be certain that all the data we receive has come from the speaker
whose voice we recognise. Data origin authentication must apply to the entire
received message, not just parts of it.
Note that in almost all environments where we wish to detect deliberate
modification of data, we will require data origin authentication. The weaker notion
of data integrity without data origin authentication is normally only required in
situations where the sole integrity concern is accidental modification of data.
13
1 BASIC PRINCIPLES
14