Cryptographic checksums or secured modification-time
information are used to detect changes to information just before the
information is interpreted. Examples include several products on the market
and experimental systems.
[Cohen88-2][Cohen88]
Complexity: The
objective of an integrity shell is to drive up the complexity of a
corruptive attack by forcing the attacker to make a modification that
retains an identical cryptographic checksum. The complexity of attack is
then tied to the complexity of breaking the cryptographic system.
fc@red.a.net