Identity comes implicitly when you use PKI, because each private key implicitly identifies an entity. Unfortunately, identifying the source is a little trickier. Of course, it would be relatively simple to extract the key and alter these documents. Just use a standard block cipher, and MAC ( Message Authentication Code (wikipedia)). If you do not really look for security - especially in the forging/alteration aspects, a secret symmetric key embedded in the application would be enough to satisfy alteration detection and encryption aspects.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |