SlideShare a Scribd company logo
2
Most read
3
Most read
8
Most read
MESSAGE INTEGRITY PROTOCOL
&
PUBLIC KEY DISTRIBUTION X.509
By ..
K.Rajalakshmi
I-MSC (IT)
Synopsis:
 Message integrity
 Key management
 X.509 certificate
Message integrity:
 Message integrity describes the concept of
ensuring that the data has not been modified
in transit
 This is typically accomplished with the use of
a hashing algorithm
 The basic premise is a sender wishes to send
a message to a receiver and wishes for the
integrity of their message to be guaranted
 The sender will calculate a hash on the
message and include the digest with the
message
 On the other side the receiver will
independently calculate the hash on just the
message and compute the resulting digest
which was sent with the message
 If they are same then the message must have
been the same as when it was originally sent
• If someone intercepted the message
changed it and recalculated the digest
before sending it along its way the
receiver hash calculation would also
match the modification message.
preventing the receiver knowing message
was modified in transit.
 If the resulting digest matches the one sent
with the message then the receiver known
two things.
 The message was definitely not altered in
transit
 The message was definitely sent by someone
who had the secret key ideally only the
intended sender
• When using a secret key in conjunction
with a message to attain message
integrity the resulting digest is known
as the message authentication code or
mac
Key management:
 In cryptography it is a very tedious task to
distribute the public and private key between
sender and receiver
 If the key is known to the third party then the
whole security mechanism become worthless so
there comes the need to secure the exchange of
key
 There are 2 aspects of key management :
 Distribution of public keys
 Use of public key encryption to distribution
secret
Public key authority:
 It is similar to directory but, improve security
by tightening control over distribution of keys
from directory
 It requires user to knows public key for the
directory
 The key are need a real time access to
directory is made by the user to obtain any
desired public key securely.
x.509 certification:
 An x.509 certificate is a structured binary
record this record consist of several key and
value pairs
Key represent field name where values may be
simple type to more complex structured binary
record is done using a standard known as ASN.1

More Related Content

PPTX
Steganography
PDF
Hash Function.pdf
PDF
AES-Advanced Encryption Standard
PPTX
Principles of public key cryptography and its Uses
PPTX
SHA- Secure hashing algorithm
PPTX
Public Key Cryptosystem
PPTX
Gps tracking system
PPTX
Difference Between Digital Signature vs Digital Certificate
Steganography
Hash Function.pdf
AES-Advanced Encryption Standard
Principles of public key cryptography and its Uses
SHA- Secure hashing algorithm
Public Key Cryptosystem
Gps tracking system
Difference Between Digital Signature vs Digital Certificate

What's hot (20)

PPTX
OpenCV presentation series- part 1
PDF
Driver Drowsiness Detection report
PPTX
Lecture 10 semantic analysis 01
PPTX
Audio steganography project presentation
DOC
Audio Steganography java project
PPTX
Certinity Factor and Dempster-shafer theory .pptx
PPTX
Cryptography - Block cipher & stream cipher
PPTX
Blow fish final ppt
PPTX
Trusted systems
PPT
Computer Worms
PPTX
Idea(international data encryption algorithm)
PPT
Diffiehellman
PDF
Huffman and Arithmetic coding - Performance analysis
PPTX
Kerberos : An Authentication Application
PPTX
Hash function
PPTX
Message digest & digital signature
PPTX
Spline representations
PPTX
PPTX
AUDIO STEGANOGRAPHY PRESENTATION
PDF
Network security & cryptography full notes
OpenCV presentation series- part 1
Driver Drowsiness Detection report
Lecture 10 semantic analysis 01
Audio steganography project presentation
Audio Steganography java project
Certinity Factor and Dempster-shafer theory .pptx
Cryptography - Block cipher & stream cipher
Blow fish final ppt
Trusted systems
Computer Worms
Idea(international data encryption algorithm)
Diffiehellman
Huffman and Arithmetic coding - Performance analysis
Kerberos : An Authentication Application
Hash function
Message digest & digital signature
Spline representations
AUDIO STEGANOGRAPHY PRESENTATION
Network security & cryptography full notes
Ad

Similar to Message integrity protocol (20)

PPT
Is unit-4-part-1
PPT
PPTX
Block Chain - Merkel and Key exchange
PPTX
Chapter-Three - Part Two.pptxyuyuyuyuyuyuyuyuyuyuo
PPTX
ET4045-2-cryptography-3
PPTX
network security for cyber security in bsc.pptx
PPTX
Module III CNS Kerberos and its example.pptx
PPT
Network Security Primer
PDF
unit4_securitypractice(oncase study).ppt
PPT
PPTX
Key distribution code.ppt
PDF
18CS2005 Cryptography and Network Security
PPTX
Meessage authentication and hash functions.pptx
PDF
Key Management
PPTX
Introduction to Cryptography
PPT
Unit 1INTRODUCTION AND KEY MANAGEMENT
PPT
Key Managment in Network Security William Stalling
PPT
ch14_ Key management in network security
PDF
Network and computer security-
Is unit-4-part-1
Block Chain - Merkel and Key exchange
Chapter-Three - Part Two.pptxyuyuyuyuyuyuyuyuyuyuo
ET4045-2-cryptography-3
network security for cyber security in bsc.pptx
Module III CNS Kerberos and its example.pptx
Network Security Primer
unit4_securitypractice(oncase study).ppt
Key distribution code.ppt
18CS2005 Cryptography and Network Security
Meessage authentication and hash functions.pptx
Key Management
Introduction to Cryptography
Unit 1INTRODUCTION AND KEY MANAGEMENT
Key Managment in Network Security William Stalling
ch14_ Key management in network security
Network and computer security-
Ad

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Cloud computing and distributed systems.
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
Teaching material agriculture food technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
cuic standard and advanced reporting.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Encapsulation theory and applications.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Empathic Computing: Creating Shared Understanding
NewMind AI Weekly Chronicles - August'25 Week I
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Cloud computing and distributed systems.
Chapter 3 Spatial Domain Image Processing.pdf
Understanding_Digital_Forensics_Presentation.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Building Integrated photovoltaic BIPV_UPV.pdf
Spectral efficient network and resource selection model in 5G networks
Teaching material agriculture food technology
The AUB Centre for AI in Media Proposal.docx
Per capita expenditure prediction using model stacking based on satellite ima...
cuic standard and advanced reporting.pdf
Programs and apps: productivity, graphics, security and other tools
MYSQL Presentation for SQL database connectivity
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Encapsulation theory and applications.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

Message integrity protocol

  • 1. MESSAGE INTEGRITY PROTOCOL & PUBLIC KEY DISTRIBUTION X.509 By .. K.Rajalakshmi I-MSC (IT)
  • 2. Synopsis:  Message integrity  Key management  X.509 certificate
  • 3. Message integrity:  Message integrity describes the concept of ensuring that the data has not been modified in transit  This is typically accomplished with the use of a hashing algorithm  The basic premise is a sender wishes to send a message to a receiver and wishes for the integrity of their message to be guaranted
  • 4.  The sender will calculate a hash on the message and include the digest with the message  On the other side the receiver will independently calculate the hash on just the message and compute the resulting digest which was sent with the message  If they are same then the message must have been the same as when it was originally sent
  • 5. • If someone intercepted the message changed it and recalculated the digest before sending it along its way the receiver hash calculation would also match the modification message. preventing the receiver knowing message was modified in transit.
  • 6.  If the resulting digest matches the one sent with the message then the receiver known two things.  The message was definitely not altered in transit  The message was definitely sent by someone who had the secret key ideally only the intended sender
  • 7. • When using a secret key in conjunction with a message to attain message integrity the resulting digest is known as the message authentication code or mac
  • 8. Key management:  In cryptography it is a very tedious task to distribute the public and private key between sender and receiver  If the key is known to the third party then the whole security mechanism become worthless so there comes the need to secure the exchange of key  There are 2 aspects of key management :  Distribution of public keys  Use of public key encryption to distribution secret
  • 9. Public key authority:  It is similar to directory but, improve security by tightening control over distribution of keys from directory  It requires user to knows public key for the directory  The key are need a real time access to directory is made by the user to obtain any desired public key securely.
  • 10. x.509 certification:  An x.509 certificate is a structured binary record this record consist of several key and value pairs Key represent field name where values may be simple type to more complex structured binary record is done using a standard known as ASN.1