Hash and MAC Lecture Notes
Hash and MAC Lecture Notes
1. Message Authentication
Purpose:
Provides non-repudiation
1. Message Encryption
3. Hash Functions
2. Security Requirements
Traffic analysis
Content modification
Sequence/timing modification
Source/destination repudiation
Definition:
How it works:
Sender generates MAC from the message and key.
Key Points:
4. MAC Properties
Requirements:
o Based on DES-CBC
6. Hash Functions
Definition:
A public, non-keyed function to condense a message: h = H(M)
Properties:
One-way function
Resistant to:
7. Birthday Attacks
Attack steps:
4. Trick someone into signing the valid one and replace with the
fake
MACs: Use block cipher modes or hash functions with a secret key
SHA-512 Details:
80 rounds
Susceptible to:
o Birthday attacks
o Meet-in-the-middle attacks
Threats:
Brute-force attacks