0% found this document useful (0 votes)
27 views

Term 1

Message authentication allows one party--the sender--to send a message to another party. If the message is modified end route, then the receiver will almost certainly detect this. Message authentication is also called data-origin authentication.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views

Term 1

Message authentication allows one party--the sender--to send a message to another party. If the message is modified end route, then the receiver will almost certainly detect this. Message authentication is also called data-origin authentication.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

Today In most peoples minds, privacy is the goal most strongly associated to cryptography.

But message authentication is even stays private, but we almost certainly do want to be sure of the originator of each message that we act on. Message authentication is what buys you that guarantee. Message authentication allows one partythe senderto send a message to another partythe receiverin such a way that if the message is modified end route, then the receiver will almost certainly detect this. Message authentication is also called data-origin authentication. Message authentication is said to protect the integrity of a message, ensuring that each message that it is received and deemed acceptable is arriving in the same condition that it was sent outwith no bits inserted, missing, or modified. In message Authentication we will consider all the security requirements. For this three alternative function used: * * * Message encryption Message Authentication Code (MAC) Hash Function

A Message Authentication Code based on Cryptographic Hash functions. Cryptography is the process of transforming plain text or original information into an unintelligible form (cipher text).So that it may be sent over unsafe channels of communication. A data string (key) controls the transformation process. Anyone getting hold of the cipher text while it is on the unsafe channel would need to have the appropriate key, to be able to get to the original information. The authorized receiver is assumed to have that key.

Elements of authentication The structure of typical cryptographic solutions: Initial entity authentication: The parties perform an initial exchange, bootstrapping from initial trusted information on each other. The result is a secret key that binds the parties to each other. Message authentication: The parties use the key to authenticate exchanged messages via message authentication codes. Typically, message authentication codes are used between two parties that share a secret key in order to authenticate information transmitted between these parties. This standard defines a MAC that uses a cryptographic hash function in conjunction with a secret key. This mechanismis called HMAC and is a generalization of HMAC . HMAC shall be used in combination with an Approved cryptographic hash function. HMAC uses a secret key for the calculation and verification of the MACs. The main goals behind the HMAC construction are: To use available hash functions without modifications; in particular, hash functions that perform well in software, and for which code is freely and widely available, To preserve the original performance of the hash function without incurring a significant degradation, To use and handle keys in a simple way, To have a well-understood cryptographic analysis of the strength of the authentication mechanism based on reasonable assumptions on the underlying hash function, and To allow for easy replaceability of the underlying hash function in the event that faster or more secure hash functions are later available.

Cryptographic key (key): a parameter used in conjunction with a cryptographic algorithm that determines the specific operation of that algorithm. In this standard, the cryptographic key is used by the HMAC algorithm to produce a MAC on the data.

Hash function: an Approved mathematical function that maps a string of arbitrary length (up to a pre-determined maximum size) to a fixed length string. It may be used to produce a checksum, called a hash value or message digest, for a potentially long string or message.
A transformation of a message of arbitrary length into a fixed-length number is called a hash function.

Keyed-hash based message authentication code (HMAC): a message authentication code that uses a cryptographic key in conjunction with a hash function. Message Authentication Code (MAC): a cryptographic checksum that results from passing data through a message authentication algorithm. In this standard, the message authentication algorithm is called HMAC, while the result of applying HMAC is called the MAC. Secret key: a cryptographic key that is uniquely associated with one or more entities. The use of the term "secret" in this context does not imply a classification level; rather the term implies the need to protect the key from disclosure or substitution.

Mess

You might also like