|
|
|
|
|
Animated slide,
details are lost in printed reproduction
|
|
|
|
1.A hash over the data, including a timestamp, is
signed by querying agent with shared secret. And put on the wire.
|
|
2.The hash data is verified using the same secret
by the receiving agent; the fact that the signature matches proves integrity
and authenticates the source of the data.
|
|
3.The receiving agent also signs the hash over
the answer and returns it.
|
|
4.The querying agents verifies the answer
signature.
|
|
|
|
|
|
Note: Keys are
configured in the servers.
|
|
Transactions are
signed: provides integrity an authentication.
|
|
|
|
Configuration
details in part II
|
|
|
|
|