Computer Networking: A Top-Down Approach (7th Edition)
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
Question
Book Icon
Chapter 8, Problem R1RQ
Program Plan Intro

Confidentiality:

When the original plaintext message cannot be determined by an attacker, who intercepts the cipher text-encryption, the message is said to be confidential.

Message Integrity:

When the receiver can detect whether the message sent is encrypted or not or was altered in transit, the property is said to be message integrity.

Expert Solution & Answer
Check Mark

Explanation of Solution

Difference between message confidentiality and message integrity:

Some of the difference between message confidentiality and message integrity are mentioned below:

Message ConfidentialityMessage Integrity
In message confidentiality, two or more hosts communicate securely, typically using encryptionIn message integrity, the message transported has not been tampered with or altered
In message confidentiality, communication cannot be monitored (sniffed) by untrusted hosts and the communication between the two parties is confidential.A message has integrity only when the payload sent is the same as the payload received.

Confidentiality without integrity:

Yes”, one can have confidentiality without integrity as sending a message confidentially does not guarantee data integrity. Although when two nodes have authenticated each other, the integrity of a message between them could be compromised during the transmission of a message.

Integrity without Confidentiality:

Yes”, one can have integrity without confidentiality as a message that is altered in transit and is detected might have been sent in plaintext and thus would not be confidential.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
cases: Compare the Poisson approximation with the correct binomial probability for the following a. P{X=2} when n = 8, p = 0.2 b. P{X 5} when n = 10, p = 0.5 c. P{X=0} when n = 20, p = 0.2 d. P{X=3} when n = 9, p = 0.1
4. Suppose that the average number of cars abandoned weekly on a certain highway is λ = 1.68. Approximate the probability that there will be (a) No abandoned cars in the next week. (b) At least 2 abandoned cars in the next week. Hint: Model the problem with a Poisson random variable.
od The probability mass function of a discrete random variable X is given by P(X = 1) = {} x=1,2,3,4 10 otherwise (a) Draw the probability mass function (PMF) of this random variable. (b) Draw the cumulative distribution function (CDF) of this random variable. (c) What is P{2< x <4}? Write it in terms of the CDF. (d) What is E[X]? (e) What is Var[X]? (f) What is E[X (6-X)]? (g) What is Var[3X - 2]?
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON
Text book image
Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science
Text book image
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning
Text book image
Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning
Text book image
Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education
Text book image
Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY