Chapter 2
Chapter 2
Chapter - 3
Hash Functions and Message
Authentication
1
Message Authentication and Hash
Functions
Authentication Requirements
Authentication Functions
Message Authentication Codes
Hash Functions
2
Authentication Requirements
Kind of attacks (threats) in the context of
communications across a network
1. Disclosure
2. Traffic analysis
3. Masquerade
4. Content modification
5. Sequence modification
6. Timing modification
7. Repudiation
Measures to deal with first two attacks:
In the realm of message confidentiality, and are addressed
with encryption
Measures to deal with threats 3 through 6
Message authentication
Measures to deal with threat 7
Digital signature
3
Authentication Requirements
Message authentication
A procedure to verify that messages come from
the alleged source and have not been altered
Message authentication may also verify
sequencing and timeliness
Digital signature
An authentication technique that also includes
measures to counter repudiation by either
source or destination
4
Message Authentication
Three alternative functions can be used to
produce the authenticator:
message encryption: the entire ciphertext is used
as its authenticator
message authentication code (MAC): a public
function of the message and a secret key that
produces a fixed-length value that serves as
authenticator
hash function: A function that maps a message of
any length into a fixed-length hash value, which
serves as the authenticator
Message Encryption
Message encryption by itself also provides a
measure of authentication
if symmetric encryption is used then:
the message must have come from the sender
because it is the only other party that possesses the
key
the content cannot be altered if message has
suitable structure, redundancy or a checksum to
detect any changes
Authentication Functions
7
Public key Encryption
9
Authentication Functions
10
Hash Functions
condenses arbitrary message to fixed size ( i.e A
hash function H accepts a variable-length block of
data M as input and produces a fixed-size hash value
h = H(M).)
The principal object of a hash function is data
integrity.
usually assume hash function is public.
Hash used to detect changes to message.
want a cryptographic hash function
computationally infeasible to find data mapping to
12
Authentication Functions
13
Authentication Functions
14
Authentication Functions
15
Authentication Functions
16
Hash Functions
17
Message Authentication Code (MAC)
An alternative way to do message
authentication
MAC is a cryptographic checksum
fixed-sized
block
depending on both message and some key
like encryption though need not be reversible
appended to message as a signature
receiver performs same computation on
message and checks it matches the MAC
provides assurance that message is
unaltered and comes from sender
Authentication Functions
19
Authentication Functions
20
Authentication Functions
21
MACs
22
END
23