December 2005
Intermediate to advanced
1032 pages
29h 12m
English
Packet authentication is used for two purposes:
To provide data origin authentication
To detect packets that have been tampered with
The following sections will discuss how packet authentication works (implementation), examples of functions that are used with packet authentication, the uses of packet authentication, and issues with performing packet authentication.
Hashing functions are used to create a digital signature by taking a variable-length input, such as user data or a packet, along with a key and feeding it into a hashing function. The output is a fixed-length result. If the same input is fed into the hashing function, it will always result in the same output.
Hashing Message ...
Read now
Unlock full access