Packets of information are authenticated. Typical examples
include the use of cryptographic checksums, routing information, redundancy
inherent in data to test the authenticity and consistency of information.
Complexity: Complexity issues are typically peripheral to the concept of
authentication of packets but the use of computational leverage is
fundamental to the effectiveness of these techniques against malicious