next up previous contents
Next: 8.3 ISO transport and Up: 8.2 Network security controls Previous: 8.2.4 Traffic control

8.2.5 Data integrity

Integrity of messages can be checked using different techniques. Data integrity often goes together with encryption and authentication techniques. In many cases one cannot expect every network user to keep authentication keys for every other user he possibly communicates with. The concept of a notary can therefore be useful, eventually at the expense of higher operating costs.



(c) 1998, Filip Schepers