Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-x24gv Total loading time: 0 Render date: 2024-05-21T10:00:06.725Z Has data issue: false hasContentIssue false

8 - Authentication and ownership protection

Published online by Cambridge University Press:  05 April 2014

Richard E. Blahut
Affiliation:
University of Illinois, Urbana-Champaign
Get access

Summary

Authentication studies methods for the verification of the signatory of a message. These methods are based on cryptography, but involve additional considerations. An authentic message, then, is one that is signed in a cryptographically secure way; otherwise, it is not acceptable. An authentic message need not be secret, and a secret message need not be authentic. This is sometimes referred to as the separation principle of secrecy and authentication. Of course, a message can be both secret and authentic, but each must be assured individually. A message can be encrypted after it is signed, or it can be signed after it is encrypted, or both, depending on the needs of the application. A signed message may even contain one or more embedded subsections that are themselves independently signed or encrypted by a third party, or are to be decrypted by yet another party.

Authentication is not the same as identfication. Identfication is a topic that studies methods for verifying or determining the identity of the transmitter of a message. While authentication verfies that the message did indeed come from the indicated sender, identification verifies that the sender does have a recognized position in the appropriate community. Authentication is studied in this chapter, and identfication is studied in Chapter 14.

Ownership protection is another topic based on, and related to, the topic of cryptography. Ownership protection studies methods for the control of who owns a message or document, and of how the owner can control the use of the document.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2014

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×