Unit 4 5
Unit 4 5
Combination
of
Message
the
fuerade meamodification d A,
Disclosure unafric Analysis
Source Destination
mass
content
Repudiation Repudiation.
modification
to
verify that received
messages come from alleged
-
level used as primitive
value used to authenticate to
message enables
verify
-
receiver the
-
authenticity of a
message
Types of functions.
- ↓ -
Hash Message Message Authentication
function
length
Encryption A function of
code (MAC)
maps message of any The
-
the
- -
value ->
authenticator.
Hash functions:
function
Mathematical that converts numerical
ilp value
-
into another
compressed numerical value
↳
Op is fixed
length. Chbit) (Any long the
Message
always
features:
fan o
Hash
Fixed
length olp
-
-compression func
-
Digest (smaller
reps of larger data Hash value (Message
Properties:
very
If
you hash
message for times then hash
->
should get
-
a a same
you
value a times.
are
messages generate a hashes
H. f H2
A calculates
a symmetric key K, not known to anyone else
Concept:
When
3
MAC
we
generate
Original Message ->
Message digest
through message digest
betredimaya
encabuption
are
HMAC.
my
ene
-
--
MD5: Message Digest
Working:
① Add padding
original mess Padding
multiple of 512.
512x515s
by less than
multiple
of 512
⑦ Append original
length before padding: (mod on)
original mess Padding
t MD5 operation diag:
will be exac t
mini
Process (P)
d
↳ m(i) + t(k)</s)
Shift Circularaft
original mess Padding length ↓
↓ Add
i
512
A
bit
-I a b C d
block n
⑭ Initialise
4-chaining variables (32-bit, A, B, C, &D) Yalaned
③ Process blocks 512
↳>copy
Habit
four
chaining valiables
into variables.
corresponding
SA a,B b,c
=
=
=
c,D d}
=
4444
a b c d
SHA : SECURE HASH ALGORITHM
SHA is modified version of MDS
↳
Hp is a
message digest of 160 bits in length .
Properties :
}
[ I] Infeasible
Generating original message from
digest .
'" ]
finding two
messages generating same
digest
Working :
}
Ci ]
Padding [ 64 bit less than exact
multiple of
512]
[ ii ]
Appending length
exactly
[ Iii ] divide the i
/p into 512 bit blocks same as MDS
Liv] 5 variables [A , B C D E ]
chaining , , ,
( )
V
Process blocks [same as MDS ]
1)
Copy of 512 -
16 Four Round
[✓
sub blocks [20 steps]
approach - nonce
-> nouce
end:
Using time
stamp:
Alice & bob synchronised.
No need
of challenge manage
3rd-bidirectional
N
Needham - Schroeder
Bob's ricket
challenge
sends
responds to challenge
-
Kerberos:
Also a KDC
Alice X Bob
ePice oaringeverretin
Ga
Authentication IDC
-
4 Service des 4
-
E:
- E:
#
server
sT9S
- -
I
Alice's authentication
For I
1 .
Tas process is a one time process
If conversation with Bob has
communicate
Alice
with
wants
John
to
perform authentication.
for
stick Bob
et She has to redo 3-6
steps
bobsession are
&
ene
Request Access
5
T
Grant Access
I
I
Procedure
Alice
II. II. Bob select 2 values :
Ri → B
Ri=g
"
mod Rz A
p →
R -
<
④
Shared secret
key
- -
- - - - - - - É -
- - - - -
- -
-
.
k=g"modp
Eve find
does not have to value
of randy to attack .
Station to station
key Agreement Method :
The
digital signature scheme the of
changes roles
private and public keys.
-
Note: -
Firstly, the private & public key of sender are used and not the receiver
it.
and receiver uses sender's public key to verify
key generation:
(n) (p 1)4eq 1)
8 =
-
-
For signature:
5 - and mod n
To
verify:
m=st mod n
o
signature along
with Pr
->
Algoritum
key
↳
to Bob
message ↓,
valid or not
Bob has S
to
relity whether the
message
sent was from Alice or not
He to
uses Alice's public key decrypt/verity
X.509:
-digital certicificate accepted internationally.
-does but
not
generate any keys provides a
way
to access public keys
v
Versions -
3 versions (1,2,3)
Al
signature Algorithm identifier Agarimmed
F issued certificate
Issuer Name person who
validity period
v from to
s
subject jisks derate to seek
name
name
of person
P Public information
key
12 Issue unique ID
E Extensions
(Inrequire)
-
Includes digests,
message
Digital signature, CAthentication, Non repudiation)
Encryption services. Cconfidentiality)
Architecture
sporescentificates andended id,
name, owner etc.
I certificate
repository.
-
to it
who is SPRI)
using this
⑧ Entity -
person/ organisation
⑤ Registation
Authority (RA) - Regiswanion everiticanoincentificate (trusted not)
in
depositony or
A
decides whether to certificate to the not
give uses or
Certificate
Authority (CA) -
CMAC -
Cipher based MAC.
has limit
-
a
message
-given message is divided into equal number of blocks and
each block is
encrypled separately
original message
Ajay is As
10(1), divide into blocks
->
encrypt and get
separate ciphertexts
17 A TE # [2
⑰
CI [3 acts as MAC
Cu -
(s
E(k,(A34(2))
=
(y =
f(k,(AyO(s))
(5 E(k,(AsO(4))
=
(n ECX, (AnP(n
=
-
1))