Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
26 views
14 pages
Cns Chapter 6
Uploaded by
archanaa04092002
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Cns Chapter 6 For Later
Download
Save
Save Cns Chapter 6 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
26 views
14 pages
Cns Chapter 6
Uploaded by
archanaa04092002
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Cns Chapter 6 For Later
Carousel Previous
Carousel Next
Download
Save
Save Cns Chapter 6 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 14
Search
Fullscreen
Message Authentication Codes ‘Syllabus Message Authentication Codes, its requirements and security: MACS based om Hash Functions Macs based on Block Ciphers. Contents 6.1 Message Authentication Codes (MAC) 6.2 MAC Based on Hash Functions 6.3 Macs Basad on Block Ciphers: 6.4 Short Questions and Answers 6.5 Mutiple Choice Questions 6-9Coptography and Network Securty 6 Message Authentication Codes [EI Message Authentication Codes (MAC) EEIEAIENTy ‘© Message authentication is a mechanism or service used to verify the integrity of a message. Message integrity guarantees that the message has not been changed, Message authentication guarantees that the sender of the message is authentic. ‘© A MAC algorithm, sometimes called a keyed hash function accepts as input a sceret key and an arbitrary-length message to be authenticated, and outputs a MAC. The MAC valve protects both a message's data integrity as well as its authenticity, by allowing verifiers to detect any changes to the message content. Properties of Message Authentication Codes L Cryptographic checksum : A MAC generates a cryptographically secure suthentication tag for a given message. 2. Symmetric : MACs are based on secret symmetric keys. The signing, and verifying parties must share a secret ey. 3. Arbitrary message size : MACs accept messages of arbitrary length. 4. Fixed output length : MACs generate fixed-size authentication tags 5. Message integrity : MACS provide message integrity: Any manipulations of a message during transit will be detected by the receiver 6. Message authentication : The receiving party is assured of the origin of the message 7. No non-repudiation : Since MACs are based! on symmetric principles, they do not provide non-repudiation. © MACs provide two security services, message integrity and message authentication, using symmetric ciphers. MACs are widely used in protocols. Both fof these services are also provided by digital signatures, but MACS are much faster. # MACs do not provide non-repudiation + In practice, MACS are either based on block ciphers or on hash functions HMAC is a popular MAC used in many practical protocols such as Transport Layee Security (TLS) indicated by a small lock in the browser. ‘Applications of MAC + Following are the situations in which MAC used. 1. Application in which the same message is broadcast to a number of destinations, 2 Authentication of a computer program in plaintext isan attractive service.Cryptography and Network Secunty 6 Message Authentication Codes 3. Another scenario is an exchange in which one side has a heavy load and cannot afford the time to decrypt all incoming, messages. ‘+ Message Authentication Codes (MAC) also known as a cryptographic check. The MAC is generated by a function C. MAC = C(K, M) where M_-= Variable length message K = Secret key shared only by sender and receiver. C(K, M) = Fixed length authenticator + Security of the MAC generally depends on the bit egth of the key. Weakness of the algorithm sth brute force atch. «For a ciphertet only attack, the opponent, given ciphertext C, would perform F, = DOK, C) fo all possible Key values K; ula, Was produced that matched the form of acceptable plaintext. Suppose the key size is greater than the MAC siz Round 1 Given My, MAC, = CXK; Mi) Compute MAC, = CXky My) for al ® heys Number of matches = 2-® + Round 2 Given : My MAC) = C(K, Ma) Compute MAC, = C(K;, Mj) for all 2*=") keys resulting from Round 1 Number of matches = 2*=?*) ‘© On average, « rounds will be needed if K = axn For example : If the key size is 80-bit and MAC is 32 bits long, then the first round will produce about 2 possible keys. Key length is less than or equal to MAC length ‘First round will produce a single match. ‘© It is possible that more than one key will produce such a match, in which case the ‘opponent would need to perform the same test on a new (message, MAC) pair. Consider the following MAC algorithm. © Let M = (X |] Xp ff sss |] Ny) be a message that is treated as a concatenation of ‘64-bit blocks X,. Then define AM) = X,OXzOX30....OXq, CCK, M) = E(K, AM) TECHNCAL PUBLICATIONS «An wp Ywuat or howledMessage Authentication Codes Cryptography and Network Secunty 6 Where @ is the exclusive-OR (XOR) and the encryption algorithm is DES in electronic codebook mode. © Key length = 56 bits MAC length = 64 bits fan opponent observes (M || C(K, M)}, a brute force attempt to determine. K will require at least 2° encryptions. ‘© Assume that an opponent knows the MAC function C but does not know K. Then the MAC function should satisfy the following requirements 1. If an opponent observes M and C(K, M), it should be computationally infeasible for the opponent to construct 0: message M’ such that CK, M?) = C(K, M). 2.C(K, M) should be uniformly distributed in the sense that for randomly chosen ‘messages, M and M’, the probability that C(K, M) = C(K, Mis 2, where n is the number of bits in the MAC. 3. Let M’ be equal to some known transformation on M. That is, M’ = f(M). ‘Message authentication code based on DES ‘The data authentication algorithm based an DES, has been one of the most widely ‘used MAC for a number of years, The algorithm can be defined as using the cipher block chaining mode of operation of DES with an initialization vector of ‘© Fig. 6.11 shows the data authentication algorithm, Tmost Times? Tmo =n men A k wat Fig. 61.4 Data authentication algorithm ‘© The algorithm can be defined as using the cipher block chaining mode of ‘operation of DES. The data to be authenticated are grouped into contiguous GLbIt blocks : Dy, Dy, Dy, esnnenns Dy TECHNICAL PUBLICATIONS «An up Uust for howledCoptography and Network Securty 65 Message Authentication Cade Using the DES encryption algorithm (E) and a secret key (K), a data authentication code (DAC) is calculated as follows ©, = EK, D) 0, = E(k, [D; @ O,) 0, = E(K, [D, @ O,) Oy = E(K, [Dy ® Oy) The DAC consists of either the entire block Oy, or the leftmost M bits of the block, with 16 5 Ms 64. TERRI Autnentication Requirements tack canbe identified as follows iL. Diedooum/t Relous of taeage cooks bo any pamom or proce not ponmesing the appropriate cryptographic key 2, Trafic analysis: Dicovery of the pater of trafic between partes. 3. Masquerade : Insertion of messages into the network from a fraudulent 4. Sequence modification : Any modification to a sequence of messages between parties, including insertion, deletion and reordering, 5. Content modification : Changes to the contents of a message, including. insertion, deletion, transposition and modification. 6. Timing modification : Delay or replay of messages 7. Source repudiation : Denial of transmission of message by source. 8. Destination repudiation : Denial of receipt of message by destination ‘© Message authentication is a procedure to verify that received messages come form the alleged source and have not been altered. ‘© Digital signature is an authentication technique that also incluxies measures to counter repudiation by the source. 1. Write a mate on: Message Authentication Cas [CTU Summert7, Marks 7 | 2 Describe MAC with t's security implications I TECHINCAL PUBLICATIONS" «nop Uma or kromiecgeCoptography and Network Securty 6 [G2] mac Based on Hash Functions [GTU : Summer-19 } © The IPsec authentication scheme uses a scheme called Hashed Message Authentication Codes (HMAC), which is an encrypted message digest described in RFC 1024 © HMAC uses a shared secret key between two parties rather than public key ‘methods for message authentication. Objectives for HMAC 1. To use, without modifications, available hash function. 2. To allow for easy replaceability of the embedded hash function in case faster or more secure hash functions are found or required. 3, To use and handle keys in a simple way. 4. To preserve the original performance of the hash function without incurring a Significant degradation, 5.To have a well understood cryptographic analysis of the strength of the authentication mechanism based on reasonable assumptions about the embedded ‘hash function. HMAC algorithm Fig. 6211 shows HMAC structure ‘© Define the following terms : H. = Embedded hash funetion Initial value input to hash function = Message input to HMAC i block of M,0
» |e « |e . Ce « [os goaCryptography and Network Secunty 6-14 Message Authentication Codes TECHNICAL PUBLICATIONS® - An wp thust for know
You might also like
Unit - 4 Notes1
PDF
No ratings yet
Unit - 4 Notes1
57 pages
C&NS UNIT-3
PDF
No ratings yet
C&NS UNIT-3
68 pages
Message Integrity and Authentication
PDF
100% (1)
Message Integrity and Authentication
31 pages
NIS5
PDF
No ratings yet
NIS5
39 pages
Message Authentication
PDF
No ratings yet
Message Authentication
47 pages
NS-ch12-2011
PDF
No ratings yet
NS-ch12-2011
22 pages
HMAC
PDF
No ratings yet
HMAC
43 pages
Chapter 8 MACUpdated10June25
PDF
No ratings yet
Chapter 8 MACUpdated10June25
26 pages
Unit 3. Message Authentication and Hash Functions
PDF
No ratings yet
Unit 3. Message Authentication and Hash Functions
72 pages
Hash Function and Digital Signature
PDF
No ratings yet
Hash Function and Digital Signature
21 pages
IS Unit-2
PDF
No ratings yet
IS Unit-2
125 pages
ch12_nemo
PDF
No ratings yet
ch12_nemo
37 pages
unit3 CNS
PDF
No ratings yet
unit3 CNS
78 pages
Message Authentication
PDF
No ratings yet
Message Authentication
15 pages
CBS 323 Message Authentication Codes (HMAC)
PDF
No ratings yet
CBS 323 Message Authentication Codes (HMAC)
28 pages
Module - IV
PDF
No ratings yet
Module - IV
98 pages
Chap 11. Message Authentication and Hash Functions
PDF
No ratings yet
Chap 11. Message Authentication and Hash Functions
26 pages
Is Unit 3 PPT - Part 1
PDF
No ratings yet
Is Unit 3 PPT - Part 1
123 pages
Message Authentication Codes
PDF
No ratings yet
Message Authentication Codes
46 pages
HMAC, CMAC
PDF
No ratings yet
HMAC, CMAC
19 pages
Unit-IV _NS_20_3_25
PDF
No ratings yet
Unit-IV _NS_20_3_25
78 pages
CNS U-4 Notes
PDF
No ratings yet
CNS U-4 Notes
36 pages
Unit-4(MAC)
PDF
No ratings yet
Unit-4(MAC)
22 pages
Unit 6 PHT - Mac - 1
PDF
No ratings yet
Unit 6 PHT - Mac - 1
50 pages
Unit III
PDF
No ratings yet
Unit III
51 pages
Lecture #9 Hashing-1
PDF
No ratings yet
Lecture #9 Hashing-1
27 pages
Cryptography and Network Security
PDF
No ratings yet
Cryptography and Network Security
25 pages
Message Authentication
PDF
No ratings yet
Message Authentication
21 pages
Chapter 11 Authenticationfinal
PDF
No ratings yet
Chapter 11 Authenticationfinal
31 pages
32-Authentication Requirements, Authentication Functions-01-03-2025
PDF
No ratings yet
32-Authentication Requirements, Authentication Functions-01-03-2025
39 pages
CH 11
PDF
No ratings yet
CH 11
28 pages
Cryptography and Network Security: Fourth Edition by William Stallings
PDF
No ratings yet
Cryptography and Network Security: Fourth Edition by William Stallings
22 pages
Cryptography and Network Security: Fourth Edition by William Stallings Lecture Slides by Lawrie Brown/Mod. & S. Kondakci
PDF
No ratings yet
Cryptography and Network Security: Fourth Edition by William Stallings Lecture Slides by Lawrie Brown/Mod. & S. Kondakci
32 pages
Used To Authenticate The Origin and Nature of A Message
PDF
No ratings yet
Used To Authenticate The Origin and Nature of A Message
7 pages
Yourppt
PDF
No ratings yet
Yourppt
17 pages
Css Chap3 Techneo
PDF
No ratings yet
Css Chap3 Techneo
8 pages
Computer Network System - Iii
PDF
No ratings yet
Computer Network System - Iii
29 pages
WINSEM2023-24 BCSE309L TH VL2023240500689 2024-03-05 Reference-Material-I
PDF
No ratings yet
WINSEM2023-24 BCSE309L TH VL2023240500689 2024-03-05 Reference-Material-I
39 pages
Cryptography and Network Security
PDF
No ratings yet
Cryptography and Network Security
16 pages
Cryptography and Network Security: Third Edition by William Stallings Lecture Slides by Lawrie Brown
PDF
No ratings yet
Cryptography and Network Security: Third Edition by William Stallings Lecture Slides by Lawrie Brown
26 pages
Unit 5
PDF
No ratings yet
Unit 5
39 pages
Bca Cs-l3 - Message Authentication - Feb 2016
PDF
No ratings yet
Bca Cs-l3 - Message Authentication - Feb 2016
23 pages
8_Ch0
PDF
No ratings yet
8_Ch0
22 pages
Plan of Talk:: Message Authentication Security Requirements
PDF
No ratings yet
Plan of Talk:: Message Authentication Security Requirements
31 pages
UNIT-IV-1
PDF
No ratings yet
UNIT-IV-1
16 pages
Answer Shruti
PDF
No ratings yet
Answer Shruti
6 pages
4.11 Data Integrity and Message Authentication
PDF
No ratings yet
4.11 Data Integrity and Message Authentication
6 pages
Chapter 6. MAC - Hash
PDF
No ratings yet
Chapter 6. MAC - Hash
37 pages
Message Authentication Is Concerned With
PDF
No ratings yet
Message Authentication Is Concerned With
21 pages
Network Security-68-85
PDF
No ratings yet
Network Security-68-85
18 pages
Authentication and Hash Function
PDF
No ratings yet
Authentication and Hash Function
21 pages
cns3 2
PDF
No ratings yet
cns3 2
11 pages
Hash Vs MAC
PDF
100% (1)
Hash Vs MAC
14 pages
Sample
PDF
No ratings yet
Sample
9 pages
Cryptography 10
PDF
No ratings yet
Cryptography 10
38 pages
Cns Unit 3
PDF
No ratings yet
Cns Unit 3
35 pages