Question

computer security

Question 2. Does message authentication imply user authentication? Is the opposite true? Explain your answer Message authentication is different from user authentication. Message authentication allows User authentication is used for access control and accountability.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

In information security, message authentication or data origin authentication is a property that a message has not been modified while in transit (data integrity) and that the receiving party can verify the source of the message. Message authentication does not necessarily include the property of non-repudiation.

Message authentication is typically achieved by using message authentication codes (MACs), authenticated encryption (AE) or digital signatures. The message authentication code, also known as digital authenticator, is used as an integrity check based on a secret key shared by two parties to authenticate information transmitted between them. It is based on using a cryptographic hashor symmetric encryption algorithm. The authentication key is only shared by at least two parties or two communicating devices but it will fail in the existence of a third party since the algorithm will no longer be effective in detecting forgeries. In addition, the key must also be randomly generated to avoid its recovery through brute force searches and related key attacks designed to identify it from the messages transiting the medium.

Whereas, user authentication is the verification of an active human-to-machine transfer of credentials required for confirmation of a user’s authenticity; the term contrasts with machine authentication, which involves automated processes that do not require user input.

User authentication is performed in almost all human-to-computer interactions other than guest and automatically logged in accounts. Authentication authorizes human-to-machine interactions on both wired and wireless networks to enable access to networked and Internet connected systems and resources.

Hence, message authentication does not imply user authentication and the opposite is false too.

Add a comment
Know the answer?
Add Answer to:
computer security Question 2. Does message authentication imply user authentication? Is the opposite true? Explain your...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Java Netbeans code Option 1: Authentication System For security-minded professionals, it is important that only the...

    Java Netbeans code Option 1: Authentication System For security-minded professionals, it is important that only the appropriate people gain access to data in a computer system. This is called authentication. Once users gain entry, it is also important that they only see data related to their role in a computer system. This is called authorization. For the zoo, you will develop an authentication system that manages both authentication and authorization. You have been given a credentials file that contains credential...

  • You have decided to build a web application that allows user authentication(enrolling and verifying users) using...

    You have decided to build a web application that allows user authentication(enrolling and verifying users) using either fingerprint, iris, face recognition or voice. Using the image attached as a guideline, your task is to come up with an architecture plan diagram and a brief explanation of the diagram for this web application, depicting the technologies or technology stack that will be used. Application Delivery Infrastructure Web Server, Portal, Application Server, & User Interface Technology Middleware Infrastructure Enterprise Service Bus, Message...

  • Option 1: Authentication System For security-minded professionals, it is important that only the appropriate people gain...

    Option 1: Authentication System For security-minded professionals, it is important that only the appropriate people gain access to data in a computer system. This is called authentication. Once users gain entry, it is also important that they only see data related to their role in a computer system. This is called authorization. For the zoo, you will develop an authentication system that manages both authentication and authorization. You have been given a credentials file that contains credential information for authorized...

  • Information Security Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True...

    Information Security Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False Question 4 (1 point) In general, private key encryption is safer than public key encryption. Question 4 options: True False Question 5 (1 point) TLS will encrypt TCP/IP transmissions. Question 5...

  • Question 1 1 point possible (graded) True or False: Because IoT is an ecosystem, IoT Security...

    Question 1 1 point possible (graded) True or False: Because IoT is an ecosystem, IoT Security is not just device security. True False Question 2 1 point possible (graded) When comparing IoT malware to traditional viruses, worms, or spam, which of these statements are true? (Select three) Conventional anti-virus or anti-spam schemes work well for IoT malware detection and prevention. IoT malware has much less user interaction. IoT malware is hard to kill due to lack of direct interface with...

  • its true or false questions 1. A computer security risk is any event or action that...

    its true or false questions 1. A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability 2. A cybercrime is an online or Internet-based illegal act 3. Information transmitted over networks has a higher degree of security risk than information kept on an organization's premises 4. Users can take several precautions to protect their home and work computers and mobile devices from these malicious...

  • Determine the security updates that apply to your computer. Compile a list of security updates for your computer and provide a summary of the vulnerabilities they prevent from being exploited. Provide...

    Determine the security updates that apply to your computer. Compile a list of security updates for your computer and provide a summary of the vulnerabilities they prevent from being exploited. Provide a summary of the course of action you have taken to secure your computer. If your computer is up-to-date in terms of recommended patches and configuration changes, choose three of the optional enhancements that would apply to your operating system (OS) version and summarize why they would be beneficial....

  • Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1...

    Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1 (1 point) Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False T Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False F Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False T Question 4 (1 point) In general, private key encryption is safer than...

  • Check Your Understanding 13.2 Instructions: Indicate whether the following statements are true or false (Tor F)....

    Check Your Understanding 13.2 Instructions: Indicate whether the following statements are true or false (Tor F). Training is not necessary for remote workforce members as long as encryption is in place in the organization. 2. Context-based access control is less stringent than role-based access control. 3. Biometric identifiers signify something that the user knows. 4. Employee nondisclosure agreements are particularly important for employees who work in remote locations or telecommute. 5. Employee training programs are not necessary to protect the...

  • QUESTION 23 Which network topology is used to span a city or a large campus and...

    QUESTION 23 Which network topology is used to span a city or a large campus and is used to build networks with high data connection speeds for the city or campus? WAN Internet LAN MAN QUESTION 24 Which of the following is a reason for an organization to implement cloud computing? Improved cost structure More control over the IT infrastructure Decreased uptime Decreased security issues QUESTION 25 To increase security, your organization is looking to minimize the accessibility of the...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT