Cryptography Part 2
Cryptography Part 2
MIS 460-561
Cryptographic Keys
Alice generates an HMAC for the message using the shared key and the SHA-256 hash function.
She sends the message along with the HMAC to Bob.
When Bob receives the message, he uses the same secret key and the same hash function
(SHA-256) to generate an HMAC from the received message. If the HMAC Bob computes
matches the HMAC Alice sent, Bob knows:
Others: Blowfish, Twofish, Serpent, IDEA, GOST, SEED, Camellia (and many others)
Asymmetric Key Encryption
Public Key Cryptography
Public Key Encryption Ciphers
• RSA
*Dominant today
*Recommended minimum key length 1024
Benefits of a digital
signature
• Integrity
• Authenticity
• Non-repudiation
Using PKI to exchange a session key
Symmetric vs. Asymmetric
Cryptography Systems
Stream vs. Block Ciphers
Stream cipher vs. Block Cipher
Souce: theamazingking.com
Block Cipher vs. Stream Cipher
Block Cipher Stream Cipher
• Using the DH alone, Bob and Alice cannot verify that they
• Message-by-Message Encryption
⚬ Nearly always uses symmetric key encryption
⚬ Already covered
⚬ Public key encryption is too inefficient
• Message-by-Message Authentication
⚬ Digital signatures
⚬ Message authentication codes (MACs)
PGP Web of Trust
CA’s (Certificate Authorities)