Comp_Sec Chapter (3)
Comp_Sec Chapter (3)
Chapter 3
Public-Key Cryptography and
Message Authentication
1
Overview
• Message Authentication
• Secure Hash Functions and HMAC
• Public-Key Cryptography Principles
• Public-Key Cryptography Algoroithms
• Digital Signatures
• Key Management
Authentication
• In addition to confidentiality, message
authentication is an important security function
• “A message, file, document or data is said to be
authentic when it is genuine and came from its
alleged source.”
• Encryption prevents against passive attacks
(eavesdropping)
• Message Authentication prevents against active
attacks or falsification.
Message Authentication
• Message authentication is concerned with:
– protecting the integrity of a message
– validating identity of originator
– non-repudiation of origin (dispute resolution)
• The three alternative functions used:
– hash function
– message encryption
– message authentication code (MAC)
Message Authentication
• Requirements - must be able to verify that:
1. Message came from apparent source or
author
2. Contents have not been altered
3. Timeliness – that it was sent at a certain
time or sequence.
public
key
public
key
? private
key
Alice Bob
42
Digital signatures
• A digital signature is an encryption of a
document with the creator’s private key
• It is attached to a document that
validates the creator of the document
• Any one can validate it by decrypting the
signature with the claimed creator’s
public key
Digital Signatures:
The Basic Idea
• Bob can sign a message using a digital
signature generation algorithm.
• The inputs to the algorithm are the
message and Bob's private key.
• Any other user, say Alice, can verify the
signature using a verification algorithm,
whose inputs are the message, the
signature, and Bob's public key.
Components of
the Digital
Signature
Model
Digital Signature Model
Digital Signature
• Message Digest: The representation of
text in the form of a single string of
digits, created using a formula called a
one-way hash function.
• Encrypting a message digest with a
private key creates a digital signature,
which is an electronic means of
authentication.
47