December 2017
Intermediate to advanced
410 pages
11h 5m
English
When a message is sent from a sender to a receiver, how does the receiver know if the message is not tampered with in the process?
One simple answer is to include the Hash Value with the Message. However, an Attacker can modify the Hash Value along with the Message itself. This is demonstrated in the following diagram:

Read now
Unlock full access