Authentication of Message

Introduction: – In the earlier chapters, you have learned about the various types and sub types of encryption technique along with their names. There are more in cryptography and cryptographic techniques that deals with the integrity of data and their threats. There is another type of data threat which is lack in authentication of message. In this case of threat the user is not sure whether the message he/she received is from the originator (one who has origin or created

Read more