Unit3 Cryptography and Cyber Security
Unit3 Cryptography and Cyber Security
10. Mention the various ways of producing authenticator or define the classes of message
authentication function
• Hash function: A function that maps a message of any length into a fixed length hash value, which
serves as the authenticator
• Message encryption: The ciphertext of the entire message serves as its authenticator
• Message authentication code (MAC): A function of the message and a secret key that produces a
fixed-length value that serves as the authenticator
11. What do you meant by MAC?
It involves the use of a secret key to generate a small fixed-size block of data, known as a cryptographic
checksum or MAC, that is appended to the message. This technique assumes that two communicating
parties, say A and B, share a common secret key .When A has a message to send to B, it calculates the
MAC as a function of the message and the key: MAC = MAC(K, M)
where
M = input message
C = MAC function
K = shared secret key
MAC = message authentication code
12. Differentiate MAC and Hash function?
MAC: In MAC , the secret key shared by sender and receiver. The MAC is appended to the message at
the source at a time which the message is assumed or known to be correct.
Hash Function: The hash value is appended to the message at the source at time when the message is
assumed or known to be correct. The hash function itself not considered to be secret.
13. List any three hash algorithm.
MD5( message Digest version 5) algorithm
SHA_1 (Secure Hash algorithm)
RIPEMD_160 algorithm
14. What is the difference between weak and strong collisions resistance?
Weak collisions resistance: for any given block x, it is computationally infeasible to find y * x with
H(y) = H(x). it is proportional to 2n .
Strong collision resistance: it is computationally infeasible to find any pair (x,y) such that H(x)= H(y). it
is proportional to 2n/2
15. Differentiate internal and external error control.
Internal error control:
In internal error control, an error detecting code also known as frame check sequence or checksum.
External error control:
In external error control, error detecting codes are appended after encryption.
16. What is the meet in the middle attack?
This is the cryptanalytic attack that attempts to find the value in each of the range and domain of the
composition of two functions such that the forward mapping of one through the first function is the same
as the inverse image of the other through the second function-quite literally meeting in the middle of the
composed function.
17. Compare MD5, SHA1 and RIPEMD-160 algorithm.
MD5 SHA-1 RIPEMD160
Digest length 128 bits 160 bits 160 bits
Basic unit of processing 512 bits 512 bits 512 bits
No.of steps 64(4 rounds of 16) 80(4 rounds of 20) 160(5 pairs rounds of
16)
64
Maximum message size infinity 2 -1 bits 264-1 bits
Primitive logical 4 4 5
function
Additive constant used 64 4 9
Endianess Little endian Big endian Little endian
18. Distinguish between direct and arbitrated digital signature?
Direct digital signature Arbitrated Digital Signature
1.The direct digital signature 1. The arbiter plays a sensitive and
involves only the crucial role in this digital signature.
communicating 2. Every signed message from a
parties. sender x to a receiver y goes first to
2.This may be formed by an arbiter A, who subjects the
encrypting the message and its signature to a
entire message with the sender’s number of tests to check its origin
private key. and content.
19. What are the properties a digital signature should have?
It must verify the author and the data and time of signature.
It must authenticate the contents at the time of signature.
It must be verifiable by third parties to resolve disputes.
20. What requirements should a digital signature scheme should satisfy?
The signature must be bit pattern that depends on the message being signed.
The signature must use some information unique to the sender, to prevent both forgery and denial.
It must be relatively easy to produce the digital signature.
It must be relatively easy to recognize and verify the digital signature.
It must be computationally infeasible to forge a digital signature, either by constructing a new
message for an existing digital signature or by constructing a fraudulent digital signature for a
given message.
It must be practical to retain a copy of the digital signature in storage.
15 MARKS