Through this process, authentication and message integrity
are ensured to the extent that the CA maintains the P1(1 user's confidence.
In this case, a message integrity
algorithm is needed to assure that the messages directed to p arrive at the location where the active copy of p is found.
4) A MIC-CLEAR message employs a cryptographic message integrity
code (MIC) to check the integrity and authenticity of the message, but no confidentiality is provided and the encoding step is omitted to permit viewing by recipients who have not implemented PEM.
SSL is application protocol-independent arid provides encryption, which creates a secured channel to prevent others from tapping into the network; authentication, which uses certificates and digital signatures to verify the identity of parties in information exchanges and transactions; and message integrity
, which ensures that messages cannot be altered en route.
Only if the service provider has no ability to decrypt the message can message integrity