ABSTRACT

In this chapter, we look at some basic message integrity technologies, i.e., technologies that are used to ensure that the received message has not been unintentionally altered

en route

compared with the originally sent message. Ensuring message integrity is also called

message authentication

as opposed to

user authentication

described in Chapter 3. One way to attain a high degree of confidence that each message is

sent and received with integrity in any network infrastructure, including a shared one like the Internet, is to make the communication link behave like a private line circuit. In this regard, the most basic approach is to use Layer 2 virtual private network (VPN) technologies to ensure the separation of traffic in the network. Layer 2 VPNs are based on the use of hop-to-hop identifications such as data-link control identifiers (DLCIs) in Frame Relay (FR

)

permanent virtual circuits (PVCs) and virtual path identifiers or virtual circuit

identifiers (VPI or VCIs) in Asynchronous Transfer Mode (ATM) to achieve separation of traffic over the entire virtual connection.