Knowledge

Message forgery

Source 📝

25: 174: 211: 116: 46: 97: 235: 50: 69: 76: 230: 157: 137:
is sending a message so to deceive the recipient about the actual sender's identity. A common example is sending a
204: 83: 240: 35: 65: 54: 39: 197: 162: 90: 181: 142: 224: 130: 138: 24: 173: 18: 185: 141:or prank e-mail as if it were originated from an 143:address other than the one which was really used 205: 8: 53:. Unsourced material may be challenged and 212: 198: 117:Learn how and when to remove this message 180:This cryptography-related article is a 7: 170: 168: 51:adding citations to reliable sources 14: 16:Message sent with a fake identity 172: 23: 1: 184:. You can help Knowledge by 158:Message authentication code 257: 167: 236:Cryptographic attacks 163:Stream cipher attack 47:improve this article 231:Cryptography stubs 193: 192: 127: 126: 119: 101: 66:"Message forgery" 248: 214: 207: 200: 176: 169: 122: 115: 111: 108: 102: 100: 59: 27: 19: 256: 255: 251: 250: 249: 247: 246: 245: 241:Practical jokes 221: 220: 219: 218: 151: 135:message forgery 123: 112: 106: 103: 60: 58: 44: 28: 17: 12: 11: 5: 254: 252: 244: 243: 238: 233: 223: 222: 217: 216: 209: 202: 194: 191: 190: 177: 166: 165: 160: 155: 154:Authentication 150: 147: 125: 124: 31: 29: 22: 15: 13: 10: 9: 6: 4: 3: 2: 253: 242: 239: 237: 234: 232: 229: 228: 226: 215: 210: 208: 203: 201: 196: 195: 189: 187: 183: 178: 175: 171: 164: 161: 159: 156: 153: 152: 148: 146: 144: 140: 136: 132: 121: 118: 110: 99: 96: 92: 89: 85: 82: 78: 75: 71: 68: –  67: 63: 62:Find sources: 56: 52: 48: 42: 41: 37: 32:This article 30: 26: 21: 20: 186:expanding it 179: 134: 131:cryptography 128: 113: 104: 94: 87: 80: 73: 61: 45:Please help 33: 225:Categories 77:newspapers 34:does not 149:See also 107:May 2010 91:scholar 55:removed 40:sources 93:  86:  79:  72:  64:  98:JSTOR 84:books 182:stub 139:spam 70:news 38:any 36:cite 129:In 49:by 227:: 145:. 133:, 213:e 206:t 199:v 188:. 120:) 114:( 109:) 105:( 95:· 88:· 81:· 74:· 57:. 43:.

Index


cite
sources
improve this article
adding citations to reliable sources
removed
"Message forgery"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
cryptography
spam
address other than the one which was really used
Message authentication code
Stream cipher attack
Stub icon
stub
expanding it
v
t
e
Categories
Cryptography stubs
Cryptographic attacks
Practical jokes

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.