Professional Documents
Culture Documents
A MAC can provide message integrity and message authentication. MAC has a drawback. It needs a symmetric key that must be establish between the sender and the receiver.
A digital signature on the other hand, can use a pair of asymmetric key (one public and a private key).
Cryptographic protocol
Cryptographic protocol or Encryption protocol is an abstract or concrete protocol performing a securityrelated function and applies cryptographic methods. A cryptographic protocol usually incorporates at least some of these aspects: Key agreement or establishment. Entity authentication. Symmetric encryption and message authentication material construction. Secured application-level data transport. Non-repudiation methods.
FUTURE SCENARIO
Digital encryption of data is useful during storage and retrieval of medical history of patients involved in e-Health programs. The growth of e-commerce and the recent enactment of the Electronic Signatures in Global and National Commerce Act (E-Sign Act) has opened a new frontier. With this constant development key management is becoming an issue. Advancements in HotJava and JavaPlugin based technologies will maintain fluidity and flexibility in key management.