Skip to content

Latest commit

 

History

History
5 lines (4 loc) · 229 Bytes

File metadata and controls

5 lines (4 loc) · 229 Bytes

Definition

How can Alice and Bob ensure Malory cannot tamper with their messages

Data and message integrity, detecting and repairing errors.

  • Techniques include using Hashing & Checksums, or message authentication codes.