EBK COMPUTER NETWORKING
EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
Question
Book Icon
Chapter 8, Problem R1RQ
Program Plan Intro

Confidentiality:

When the original plaintext message cannot be determined by an attacker, who intercepts the cipher text-encryption, the message is said to be confidential.

Message Integrity:

When the receiver can detect whether the message sent is encrypted or not or was altered in transit, the property is said to be message integrity.

Expert Solution & Answer
Check Mark

Explanation of Solution

Difference between message confidentiality and message integrity:

Some of the difference between message confidentiality and message integrity are mentioned below:

Message ConfidentialityMessage Integrity
In message confidentiality, two or more hosts communicate securely, typically using encryptionIn message integrity, the message transported has not been tampered with or altered
In message confidentiality, communication cannot be monitored (sniffed) by untrusted hosts and the communication between the two parties is confidential.A message has integrity only when the payload sent is the same as the payload received.

Confidentiality without integrity:

Yes”, one can have confidentiality without integrity as sending a message confidentially does not guarantee data integrity. Although when two nodes have authenticated each other, the integrity of a message between them could be compromised during the transmission of a message.

Integrity without Confidentiality:

Yes”, one can have integrity without confidentiality as a message that is altered in transit and is detected might have been sent in plaintext and thus would not be confidential.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
Which of the following methods help when a model suffers from high variance? a. Increase training data. b. Increase model size. c. Decrease the amount of regularization. d. Perform feature selection.
57 Formula 1 point Use shift folding, length 3, on the following value to calculate the Hash Value. 114184121 Type your answer...
Write a program that reads a list of 10 integers, and outputs those integers in reverse. For coding simplicity, follow each output integer by a space, including the last one. Then, output a newline. Ex: If the input is: 2 4 6 8 10 12 14 16 18 20 the output is: 20 18 16 14 12 10 8 642 To achieve the above result, first read the integers into an array. Then output the array in reverse. 623802 1031906 nx3zmv7.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education