Rejecting Faked Messages and Deceptive Data

Page #444 of Chapter: Crypto-for-the-rest-of-us

level indicator


The method: cryptographically packaging the sent message and data using a piece of data (key), which we expect to be possessed only by the declared sender.

The success of these methods depends on (i) how robust is the crypto-packaging, and on (ii) how well guarded is that key.

* Version CE-H6703 (SERVER) Crypto Academy