Printer Friendly

Defining moment.

YOU GET AN e-mail from a trusted associate with vital information about an upcoming corporate deal. How do you know that it's truly from your associate and that the message has not been tampered with?

A computerized function helps you find out. This function distills the text of an e-mail into a set of numbers before an e-mail message is encrypted.

Then, when the message is received, the recipient's computer decrypts the message and distills the e-mail into numbers again. It then automatically compares the numbers. If they match, the message has not been tampered with; if they don't, then the received message is not the same as the original version.

What is this function called?

Hint: Think of a common type of breakfast potatoes.

ANSWER: Hashing.
COPYRIGHT 2005 American Society for Industrial Security
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2005 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Title Annotation:hashing for e-mail security
Author:Piazza, Peter
Publication:Security Management
Article Type:Brief Article
Geographic Code:1USA
Date:Oct 1, 2005
Words:127
Previous Article:Security as a governance concern.
Next Article:Connect with vision: delivering the power of total video security systems.
Topics:


Related Articles
Email Storming the Internet, Say VeriSign Numbers.
Sarbanes-Oxley: compliance meets technology.
Preparing for encryption: new threats, legal requirements boost need for encrypted data.
Wood, Wind and Water (nautical).
In Canada, a low-key approach to virtues training pays big dividends.
SpheriQ update.
School prayer by any other name?

Terms of use | Privacy policy | Copyright © 2022 Farlex, Inc. | Feedback | For webmasters |