Chap 11. Message Authentication and Hash Functions
Chap 11. Message Authentication and Hash Functions
Chap 11.
Message Authentication and
Hash Functions
H. Yoon
Authentication Requirements
Authentication Requirements
Disclosure
Confidentiality
Traffic analysis
Masquerade
Content modification
Message
Digital
Authentication
Sequence modification
Signature
Timing modification
Source repudiation
Specialized Digital Signature
Destination repudiation
H. Yoon
Authentication Requirements
Authentication Requirements
Message authentication
A procedure to verify that received messages come from the
alleged source and have not been altered
Message authentication may also verify sequencing and
timeliness
Digital signature
An authentication technique that also includes measures to
counter repudiation by the source
H. Yoon
Authentication Functions
Authentication Functions
Message authentication or digital signature
mechanism can be viewed as having two levels
At lower level: there must be some sort of functions producing an
authenticator a value to be used to authenticate a message
This lower level functions is used as primitive in a higher level
authentication protocol
H. Yoon
Authentication Functions
Message Encryption
Symmetric encryption can serve as authenticator
Symmetric encryption provides authentication as well as
confidentiality
Requires recognizable plaintext or other structure to distinguish
between well-formed legitimate plaintext and meaningless random
bits
e.g., ASCII text, an appended checksum, or use of layered
protocols
H. Yoon
Authentication Functions
H. Yoon
Authentication Functions
H. Yoon
H. Yoon
Authentication Functions
H. Yoon
10
Authentication Functions
H. Yoon
11
Authentication Functions
H. Yoon
12
Authentication Functions
H. Yoon
13
Authentication Functions
H. Yoon
14
Authentication Functions
Hash Function
One-way hash function
Converts a variable size message M into fixed size hash code
H(M) (Sometimes called a message digest)
Unlike the MAC, a hash code does not use a key but is a
function only of the input message
Provides message integrity
H. Yoon
15
Authentication Functions
H. Yoon
16
Authentication Functions
H. Yoon
17
Authentication Functions
H. Yoon
18
MACs
MAC = CK(M)
M is a variable-length message
K is a key shared only by sender and receiver
MAC is the fixed-length authenticator
H. Yoon
19
MACs
H. Yoon
20
MACs
Attacks on MACs
Other attacks are possible, depending on the MAC
algorithm
E.g., consider the following MAC algorithm
Let M = (X1 || X2 || || Xm) be a message that is treated as a
concatenation of 64-bit blocks Xi
Define (M) = X1 X2 Xm; CK(M) = EK[(M)]
H. Yoon
21
MACs
H. Yoon
22
MACs
H. Yoon
23
Hash Functions
Hash Functions
h = H(M)
M is a variable-length message
h is a fixed-length hash value
H is a hash function
H. Yoon
24
Hash Functions
H. Yoon
25
Hash Functions
H. Yoon
26
Hash Functions
H. Yoon