CyberSecurity ( Conceptual Question ) Please answer to the point to only what is asked.
When transmitting a message over a network, a cryptographic hash function may be used to detect errors (random bit flips) in the message. This may be done by transmitting the hash value of the message along with the message. The recipient then caclualtes the hash value themselves based on the reicieved message and checks if it matches. However, when protecting message integrity against an attack, we need a MAC, such as hmac (consisting of hashing a key concatenated with the message). Explain the reason why there is a difference between protecting against these two different sources of change to a message.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here