Confidentiality:
When the original plaintext message cannot be determined by an attacker, who intercepts the cipher text-encryption, the message is said to be confidential.
Message Integrity:
When the receiver can detect whether the message sent is encrypted or not or was altered in transit, the property is said to be message integrity.
Explanation of Solution
Difference between message confidentiality and message integrity:
Some of the difference between message confidentiality and message integrity are mentioned below:
Message Confidentiality | Message Integrity |
In message confidentiality, two or more hosts communicate securely, typically using encryption | In message integrity, the message transported has not been tampered with or altered |
In message confidentiality, communication cannot be monitored (sniffed) by untrusted hosts and the communication between the two parties is confidential. | A message has integrity only when the payload sent is the same as the payload received. |
Confidentiality without integrity:
“Yes”, one can have confidentiality without integrity as sending a message confidentially does not guarantee data integrity. Although when two nodes have authenticated each other, the integrity of a message between them could be compromised during the transmission of a message.
Integrity without Confidentiality:
“Yes”, one can have integrity without confidentiality as a message that is altered in transit and is detected might have been sent in plaintext and thus would not be confidential.
Want to see more full solutions like this?
Chapter 8 Solutions
EBK COMPUTER NETWORKING
- If I have a very important non-confidential communication to send to a friend, my goal is to get it to him or her with its integrity intact, even if other people see it. Outline the methods and procedures you'd use to send this message in a safe way.arrow_forwardAssume I have a very sensitive non-confidential message to send to a friend, and my objective is to convey it to my friend with its integrity intact, regardless of whether it is seen by others. Outline the approaches and processes you'd use to securely convey this communication.arrow_forwardHow does the "Keyed-Hash Message Authentication Code" (HMAC) ensure data integrity and authenticity in communications?arrow_forward
- Is encryption of the connection and data from end to end possible? What is the advantage? Describe a scenario in which all encryption methods would be beneficial.arrow_forwardWhich is better between MAC-algorithm and Digital Signature for message integrity.Explain.arrow_forwardIs it possible to safeguard communications using message secrecy and integrity security? Is it the same message? What makes you think that?arrow_forward
- Is connection and data end-to-end encryption possible? What is the value? Describe a scenario in which all forms of encryption are beneficial.arrow_forwardLet's say I want to send a very sensitive non-confidential message to a friend without compromising its integrity. How would you transmit this information securely?arrow_forwardQuestion (in long answer) Give some situation on how the Public and Private Key could be used for sender and receiver in sending the messages. Based on that situation, discuss and explain in details.arrow_forward
- What is IP Security (IPsec)? Provide four examples of the use of IPsec In what order should the signature function and the confidentiality function be applied to a message? Explain your answer What is a Security Association (SA)? What parameters identify an SA?arrow_forwardAlice and Bob wish to share the private messages,where each of them of them two separate keys generated,what kind of strategy would you suggest to ensure confidentiality,key management,and authentication forconversation between Alice and Bob? Explain the strategy and also highlight the design issues related to strategy proposed?arrow_forwardAlice and Bob wish to share the private messages,where each of them of them two separate keys generated,what kind of strategy would you suggest to ensure confidentiality,key management,and authentication for conversation between Alice and Bob?Explain the strategy and also highlight the design issues related to strategy proposed?arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education