blank.gif (43 bytes)

Church Of The
Swimming Elephant

Search:
2. Message Integrity Check Algorithms Connected: An Internet Encyclopedia
2. Message Integrity Check Algorithms

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1423
Prev: 1.1 DES in CBC Mode (DES-CBC)
Next: 2.1 RSA-MD2 Message Digest Algorithm

2. Message Integrity Check Algorithms

2. Message Integrity Check Algorithms

This section identifies the alternative algorithms that shall be used to compute Message Integrity Check (MIC) values for PEM messages. Character string identifiers and ASN.1 object identifiers are assigned for incorporation in encapsulated "MIC-Info:" and "Key- Info:" header fields to indicate the choice of MIC algorithm employed.

A compliant PEM implementation shall be able to process all of the alternative MIC algorithms defined here on incoming messages. It is a sender option as to which alternative is employed on an outbound message.


Next: 2.1 RSA-MD2 Message Digest Algorithm

Connected: An Internet Encyclopedia
2. Message Integrity Check Algorithms

Cotse.Net

Protect yourself from cyberstalkers, identity thieves, and those who would snoop on you.
Stop spam from invading your inbox without losing the mail you want. We give you more control over your e-mail than any other service.
Block popups, ads, and malicious scripts while you surf the net through our anonymous proxies.
Participate in Usenet, host your web files, easily send anonymous messages, and more, much more.
All private, all encrypted, all secure, all in an easy to use service, and all for only $5.95 a month!

Service Details

 
.
www.cotse.com
Have you gone to church today?
.
All pages ©1999, 2000, 2001, 2002, 2003 Church of the Swimming Elephant unless otherwise stated
Church of the Swimming Elephant©1999, 2000, 2001, 2002, 2003 Cotse.com.
Cotse.com is a wholly owned subsidiary of Packetderm, LLC.

Packetderm, LLC
210 Park Ave #308
Worcester, MA 01609